Enhanced Message Digest Version 5 Architecture for Secure Hashing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The message digest algorithm is a widely used cryptographic hash function. It produces a 128-bit hash value. It has been used in a variety of security applications and is also commonly used to check data integrity. However MD5 has been found not to be collision resistant. It is possible to find a pseudo-collision, that is, two different initialization vectors which produce an identical digest. Other attacks that have been found to be working on MD5 are rainbow, dictionary and brute-forcing attacks. The ability to find collisions has been greatly aided by the graphics processing unit (GPU). The solution to these collisions is a robust MD5 compression function. This research paper focused on enhancing the Merkle Damgard model construction, which is the core component of the hashing process. It involved adding an extra iteration so that instead of the current two -cycle looping, we have a three-cycle looping per message block. The aim is to make it computationally infeasible to reverse the hash function. In this way, make the whole MD5 algorithm would be made stronger. This algorithm could then be used for password hashing in an effort to make them robust. The new password hashing mechanism find applications in areas such as digital signatures and digital certificates.
Authors and Affiliations
Mwangi Joseph, Teresah Wachiuri, Dr. Wilson Cheruiyot
Voltage Control Of Three Phase Ac/Dc Pwm Converters UsingFeedback Linearisation
Abstract: This paper proposes a voltage control strategy for a three level PWM converter based on feedbacklinearization in order to control dc bus voltage. Incorporating the power balance of the input and output si...
Face Detection and Recognition using Viola-Jones algorithm and fusion of LDA and ANN
Abstract: Building a computational model for recognizing a face is a complicated task as the face is a complex multidimensional visual model. The proposed paper focuses on human face recognition by calculating the featur...
A survey on comparative study of solar energy on Improving the performance of solar power plants through IOT and predictive data analytics
Abstract: To increase the utilization and development of solar energy which is Eco friendly. Weather Predication is done in order to improve the performance and maintain its consistency for long term to deliversecure and...
Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes
with the advancement of technology, the threats dealt by user have increased exponentially. Hence security of data is required during storage and transmission of data. Image Steganography is best popular techni...
Semantic Web Service Discovery Using Sense Match Making
Semantic Web Service is an emerging technology which is growing popularly, due to the increased level of machine understandability. In this paper we propose semantic web service discovery framework using Sense ba...