SHA-1 and MD5 Cryptographic Hash Functions: Security Overview
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers. In the article, we present a security overview of both algorithms and demonstra...
Main Author: | Roman Jasek |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Žilina
2015-02-01
|
Series: | Communications |
Subjects: | |
Online Access: | https://komunikacie.uniza.sk/artkey/csl-201501-0012_sha-1-and-md5-cryptographic-hash-functions-security-overview.php |
Similar Items
-
Efficient Architectures for Full Hardware Scrypt-Based Block Hashing System
by: Duc Khai Lam, et al.
Published: (2022-03-01) -
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
by: E. V. Listopad
Published: (2019-06-01) -
SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)
by: Fahmi Basya, et al.
Published: (2022-01-01) -
Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah
by: Hajra Rasmita Ngemba, et al.
Published: (2023-08-01) -
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256
by: Shuqin Zhu, et al.
Published: (2018-09-01)