TBU Publications
Repository of TBU Publications

SHA-1 and MD5 cryptographic hash functions: Security overview

DSpace Repository

Show simple item record

dc.title SHA-1 and MD5 cryptographic hash functions: Security overview en
dc.contributor.author Jašek, Roman
dc.relation.ispartof Komunikácie
dc.identifier.issn 1335-4205 Scopus Sources, Sherpa/RoMEO, JCR
dc.date.issued 2015
utb.relation.volume 17
utb.relation.issue 1
dc.citation.spage 73
dc.citation.epage 80
dc.type article
dc.language.iso en
dc.publisher University of Zilina
dc.subject Algorithm en
dc.subject Bcypt en
dc.subject Function en
dc.subject Hashing en
dc.subject MD5 en
dc.subject PBKDF2 en
dc.subject Scrypt en
dc.subject Security en
dc.subject SHA-1 en
dc.description.abstract Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers. In the article, we present a security overview of both algorithms and demonstrate the necessity to abandon them in favor of more resilient alternatives due to low computational requirements necessary to reverse engineer the message digests, or to future proof security due to advances in hardware performance and scalability. Suitability procedures and their methods of use are part of this article. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1004517
utb.identifier.obdid 43874524
utb.identifier.scopus 2-s2.0-84921868598
utb.source j-scopus
dc.date.accessioned 2015-05-28T11:39:07Z
dc.date.available 2015-05-28T11:39:07Z
utb.contributor.internalauthor Jašek, Roman
Find Full text

Files in this item

Show simple item record