Comparison of Hash Function Algorithms Against Attacks: A Review

Abstract

Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authentication and integrity of the data, including MD5, SHA-1, SHA-2, SHA-3 and RIPEMD. This paper involves an overview of these standard algorithms, and also provides a focus on their limitations against common attacks. These study shows that these standard hash function algorithms suffer collision attacks and time inefficiency. Other types of hash functions are also highlighted in comparison with the standard hash function algorithm in performing the resistance against common attacks. It shows that these algorithms are still weak to resist against collision attacks.

Authors and Affiliations

Ali Maetouq, Salwani Mohd Daud, Noor Azurati Ahmad, Nurazean Maarop, Nilam Nur Amir Sjarif, Hafiza Abas

Keywords

Related Articles

Four-Class Motor Imagery EEG Signal Classification using PCA, Wavelet and Two-Stage Neural Network

Electroencephalogram (EEG) is the most significant signal for brain-computer interfaces (BCI). Nowadays, motor imagery (MI) movement based BCI is highly accepted method for. This paper proposes a novel method based on th...

The Use of Programming Languages on the Final Project Report by Using Analytical Hierarchy Process (AHP)

The development in information technology provides a lot of convenience for everyone. Academy of Information Management and Computer (AIMC) students of the fourth semester, implementing the Job Training must specify the...

Differential Evolution based SHEPWM for Seven-Level Inverter with Non-Equal DC Sources

This paper presents the application of differential evolution algorithm to obtain optimal switching angles for a single-phase seven-level to improve AC voltage quality. The proposed inverter in this article is composed o...

A Novel Student Clustering Model for the Learning Simplification in Educational Environments

Students’ clustering is considered to be a method of granting students many different ways of being able to learn by taking into account the student’s degree. The definition of clustering can be “a group of steps that di...

Big Data Processing for Full-Text Search and Visualization with Elasticsearch

In this paper, the task of using Big Data to identify specific individuals on the indirect grounds of their interaction with information resources is considered. Possible sources of Big Data and problems related to its p...

Download PDF file
  • EP ID EP375442
  • DOI 10.14569/IJACSA.2018.090813
  • Views 101
  • Downloads 0

How To Cite

Ali Maetouq, Salwani Mohd Daud, Noor Azurati Ahmad, Nurazean Maarop, Nilam Nur Amir Sjarif, Hafiza Abas (2018). Comparison of Hash Function Algorithms Against Attacks: A Review. International Journal of Advanced Computer Science & Applications, 9(8), 98-103. https://europub.co.uk/articles/-A-375442