SHA-1 and MD5 Cryptographic Hash Functions: Security Overview
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers. In the article, we present a security overview of both algorithms and demonstra...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Žilina
2015-02-01
|
Series: | Communications |
Subjects: | |
Online Access: | https://komunikacie.uniza.sk/artkey/csl-201501-0012_sha-1-and-md5-cryptographic-hash-functions-security-overview.php |