SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj +4 more sources
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova +3 more
doaj +6 more sources
A Cryptographic Iterative Hash Function Scheme for Wireless Sensor Network (WSNs) Security Enhancement for Sensor Data Transmission in Blockchain [PDF]
<p>The study will shed light on the proposed system of WSN security for the sensor data transmission using the blockchain. The system will be presented according to the research and practical implications of the blockchain systems. The paper proposes a method for enhancing the data security of wireless sensor networks based on blockchain ...
Mohammed Rajhi
+7 more sources
Security of a New Cryptographic Hash Function - Titanium [PDF]
This paper introduces the security analysis of Titanium hash function that uses SF block cipher and follows sponge construction. A brief description of the sponge function and the design choice of Titanium are introduced. Basic security criteria of random function have been presented and studied on Titanium and then, differential cryptanalysis on ...
Abdullah Nazeeh Saleh +1 more
openalex +4 more sources
Security Properties of Domain Extenders for Cryptographic Hash Functions [PDF]
Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most common procedure to extend the domain of
Elena Andreeva +2 more
openalex +3 more sources
A secure and efficient cryptographic hash function based on NewFORK-256
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj +3 more sources
Basic Cryptographic Concepts and Open Problems in Hash Function Security
JOHNNA SMITH, Dept of Mathematics, Shepherd University, Shepherdstown, WV, 25443, and DONALD MILLS, Dept of Computer Sciences, Mathematics, and Engineering, Shepherd University, Shepherdstown, WV, 25443. Analysis of basic cryptographic concepts and recent open problems in hash function security.
Johnna Smith, Donald Mills
openalex +3 more sources
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction [PDF]
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim +6 more
doaj +2 more sources
This paper explores hash functions and their security challenges, which ensure data integrity and confidentiality in digital systems. With advancing computing power, particularly GPUs and distributed networks, hash functions face increasing threats from brute-force, dictionary, and rainbow table attacks.
Jasmin Redžepagić +3 more
openalex +2 more sources
Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications [PDF]
Non-cryptographic (NC) hash functions are the core part of many networking and security applications such as traffic flow monitoring and deep packet inspection. For these applications, speed is more important than strong cryptographic properties. In Terabit Ethernet networks, the speed of the hash functions can have a significant impact on the overall ...
Mujtaba Hassan +4 more
openalex +3 more sources

