SHA-1 and MD5 Cryptographic Hash Functions: Security Overview

Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers. In the article, we present a security overview of both algorithms and demonstra...

Full description

Bibliographic Details
Main Author: Roman Jasek
Format: Article
Language:English
Published: University of Žilina 2015-02-01
Series:Communications
Subjects:
Online Access:https://komunikacie.uniza.sk/artkey/csl-201501-0012_sha-1-and-md5-cryptographic-hash-functions-security-overview.php