Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Review of Comparative Study of MD5 and SHA Security Algorithm

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 14
Year of Publication: 2014
Authors:
Surbhi Aggarwal
Neha Goyal
Kirti Aggarwal
10.5120/18267-9305

Surbhi Aggarwal, Neha Goyal and Kirti Aggarwal. Article: A Review of Comparative Study of MD5 and SHA Security Algorithm. International Journal of Computer Applications 104(14):1-4, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Surbhi Aggarwal and Neha Goyal and Kirti Aggarwal},
	title = {Article: A Review of Comparative Study of MD5 and SHA Security Algorithm},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {14},
	pages = {1-4},
	month = {October},
	note = {Full text available}
}

Abstract

Security algorithms or cryptography enables secure communication between two parties in the presence of a third-party or an eavesdropper. It assures the recipient of the message of the authenticity of the claimed source, protects the message against the unauthorized release of the message content by the adversaries, limits the access to authorized users, protects against sender/receiver denying sending/receiving a message. MD5 and Security Hash algorithms (SHA), cryptographic hash algorithms are one-way hashing functions which are easier to compute but are much harder to reverse and would take around millions of years to compute the authentic or veritable message content. This research paper aims to analyze and juxtapose the two hash algorithms, MD5 and SHA, using various key features and performance metrics. Their features have also been highlighted in order to provide the researchers a better comparison picture so that they can reach to the final upshot, which algorithm has superseded the other.

References

  • Andrew S. Tanenbaum, Pearson Publication, Fourth edition, Computer Networks.
  • Professor Guevara Noubir, Fundamentals of Cryptography: Algorithms, and Security Services.
  • Wikipedia, the free encyclopedia.
  • Jerry li, MD5 Message Digest Algorithm. San Jose University, Computer Science department
  • Ruth Betcher, Secure Hashing Algorithm.
  • MD5 is faster than SHA-1. Journal Of Omnifarious-Myth.
  • William Stalling7, Fourth Edition, Cryptography and Network Security (Various Hash Algorithms).
  • http://stackoverflow. com/questions/2948156/algorithm-complexity-security-md5-or-sha1
  • http://idrbtca. org. in/inf_crypto. htm
  • Addam Schroll, ITNS and CERIAS CISSP Luncheon Series: Cryptography.
  • http://science. opposingviews. com/advantages-disadvantages-symmetric-key-encryption-2609. html

Keywords