Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A new Approach in Expanding the Hash Size of MD5.
Author(s):
1. Esmael V Maliberan: Graduate Programs, Technological Institute of the Philippines, Quezon City, Philippines
2. Ariel M Sison: Graduate Programs, Technological Institute of the Philippines, Quezon City, Philippines
3. Ruji P Medina: Graduate Programs, Technological Institute of the Philippines, Quezon City, Philippines
Abstract:
The enhanced MD5 algorithm has been developed by expanding its hash value up to 1280 bits from the original size of 128 bit using XOR and AND operators. Findings revealed that the hash value of the modified algorithm was not cracked or hacked during the experiment and testing using powerful bruteforce, dictionary, cracking tools and rainbow table such as CrackingStation, Hash Cracker, Cain and Abel and Rainbow Crack which are available online thus improved its security level compared to the original MD5. Furthermore, the proposed method could output a hash value with 1280 bits with only 10.9 ms additional execution time from MD5.
Page(s): 374-379
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 10, Issue: 2, Year: 2018
Keywords:
Keywords are not available for this article.
References:
[1] A.Arora,A.Rastogi,A.Khanna,A.Agarwal, 2017.Cloud Security Ecosystem for Data Security,7th International Conference on Cloud Computing, Data Science& Engineering - Confluence -
[2] A.Bhandari, 2017.Enhancement of MD5 Algorithm for Secured Web Development”,Journal of Software 12 240 -252
[3] A.Kasgar,J.Agrawal,S.Sahu, 2012.New Modified 256- bit MD5 Algorithm with SHA Compression Function”,International Journal of Computer Applications 42 -
[4] A.Pandey,P.Bonde, 2013.A Modified Approach For Cryptograpic Hash Function Based On MD5 Algorithm”,International Journal of Engineering Research & Technology (IJERT) 2 -
[5] C.Paar,J.Pelzl,B.Preneel, 2010.Understanding Cryptography: A Textbook for Students, -
[6] D.Farhan,M.Ali, 2015.Enhancement MD5 Depend on Multi Techniques”,International Journal on Software Engineering -
[7] E.Sediyono,K.Santoso, 2013.Secure Login by Using One-time Password Authentication Based on MD5 Hash Encrypted SMS”, -
[8] F.Wang,C.Yang,Q.Wu,Z.Shi, 2012.Constant Memory Optimizations in MD5 Crypt Cracking Algorithm on GPU Accelerated Supercomputer Using CUDA”,The 7th International Conference on Computer Science & Education (ICCSE -
[9] G.Raj,R.Kesireddi,S.Gupta, 2015.Enhancement of SecurityMechanism for Confidential Data using AES128, 192 and 256bit Encryption in Cloud”,1st International Conference on Next Generation Computing Technologies -
[10] Kumar and P.,Kumar, 2013.Rainbow Table to crack Password using MD5 Hashing Algorithm”,Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT2013) -
[11] K.Kim, 2013.Efficient implementation of MD5 Algorithm in Password Recovery of a PDF file”, -
[12] K.Theoharoulis,I. Papaefstathiou, 2010.Implementing Rainbow Tables in High end FPGAs for superfast password Cracking”,International Conference on Field Programmable Logic and Applications -
[13] L.Zhong,W.Wan,D.Kong, 2016.Javaweb Login Authentication Based On Improved Md5 Algorithm”, -
[14] N.Khanezaei,Z.Hanapi, 2014.A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services”,Conference on Systems, Process and Control -
[15] M. D. A. Chawdhury and A.,Habib, 2008.Security Enhancement of MD5 Hashed Passwords by Using the Unused Bits of TCP Header”,Proceedings of 11th International Conference on Computer and Information Technology (ICCIT -
[16] M.Kioon,Z.Wang and S. Das, 2013.Security Analysis of MD5 algorithm in Password Storage”,Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA-13) -
[17] M.Stevens,A.Lenstra,B.Weger, .Chosenprefix Colisions for MD5 and applications,International Journal on Applied Cryptography 2 -
[18] Mehrabani,TelecommunicationsForum,TELFOR, 2012.Design of an ASIP Processor for MD5 Hash Algorithm”, -
[19] P.Walia,V.Thapar, 2014.Implementation of New Modified MD5-512 bit Algorithm for Cryptography”,International Journal of Innovative Research in Advanced Engineering (IJIRAE) 1 -
[20] Q.Kester,L.Nana,A.Pascu,S.Gire, 2013.A New Encyption Cipher for Securing Digital Images of Video Surveillance Devices using Diffie-Hellman- MD5 Algorithm and RGB shuffling”,European Modelling Symposium IEEE -
[21] R.Roshdy,M.Fouad,M.Aboul-Dahab, 2013.“Design And Implementation A New Security Hash Algorithm Based On Md5,International Journal of Engineering Sciences & Emerging Technologies 6 29 -36
[22] S.Sonh, 2012.A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms”,The Journal of the Korean Institute of Information and Communication Engineering 16 1015 -1022
[23] V.Kapoor, 2014.A new security system using ECC and MD5”, -
[24] V.Mahalle,A.Shahade, 2014.Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm”, -
[25] V.Mishra,V.Pandey, 2013.Architecture based on MD5 and MD5-512 Bit Applications,International Journal of Computer Applications” -
[26] 2014.Performance analysis of Black Hole attack Detection scheme using MD5 algorithm in WSN”,International Conference on Smart Structures & Systems -
[27] W.Xijin,F.Linxiu, 2012.The Application Research of MD5 Encryption Algorithm in DCT Digital Watermarking”,Physics Procedia -
[28] X.Zheng,J.Jin, 2012.Research for the Application and Safety of MD5 Algorithm in Password Authentication”, -
[29] Y.Sasaki, 2015.Improved Single-Key Distinguisher on HMACMD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC”,IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 26 -38
[30] C.Dobre, 2013.Hash Function XOR”,Information Security Journal -
[31] E.Vandierndonck, 2005.“XOR- based Hash Function”,IEEE Transactions on Computers 54 -
[32] G.Gordon, 2016., -
[33] A.Reyes,E.Festijo,R.Medina, 2018.Securing One Time Password (OTP) for MultiFactor Out-ofBand Athentication through a 128- bit Blowfish”,International Journal of Communication Networks and Information Security (IJCNIS) 10 -
[34] S.Nashwan, 2017.Secure and Efficient Hash Protocol for RFID System”,International Journal of Communication Networks and Information Security (IJCNIS 9 -
[35] M.Jain,N.Agrawal, 2015.,4th International Conference on System Modeling & Advancement in Research Trends (SMART) -
[36] A.Bhandari,M.Bhuiyan,P.Prasad, 2017.Enhancement of MD5 Algorithm for Secured Web Development”,Journal of Software 12 -
[37] G.Liu and H. Qi, 2014.Improvement and Implementation of an MD5 Algorithm”, Information Technology, -
[38] S.Tyagi,S.Luthra, 2014.A New Improved,International Journal of Engineering And Computer Science 3 7257 -7261
[39] A.Santra,N. S, 2012.A Modified MD5 Algorithm for Wireless Networks”,International Journal of Advanced Research in Computer Science 3 -
[40] Smith and S. Bhati, “A New Modified 512-bit Approach for MD5 Algorithm”, International Journal of Latest Technology in Engineering, Management & Applied Science, vol. 2, no. 8, 2013
[41] Wang, C. Yang, Q. Wu and Z. Shi, “Constant Memory Optimizations in MD5 Crypt Cracking Algorithm on GPU-Accelerated Supercomputer Using CUDA”, The 7th International Conference on Computer Science & Education, 2012
[42] G.Singh, 2013.Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES”,Second International Conference on Advanced Computing -
Citations
Citations are not available for this document.
0

Citations

0

Downloads

14

Views