Survey Paper On Different Type of Hashing Algorithm
Survey Paper On Different Type of Hashing Algorithm
Abstract: Hash functions play a crucial role in data security on the internet. Cryptographic
hash functions, used in various security applications, transform arbitrary-length data into a
fixed-size output known as a message digest. They ensure message integrity, enabling
recipients to detect any changes made to a message during transmission. This property is
valuable for digital signatures and other applications like random number generation. Many
hash functions, including MD-5, SHA-1, SHA-2, and SHA-3, are based on the Merkle-
Damgard construction, but they are not entirely immune to attacks. This paper explores
vulnerabilities associated with this construction and discusses corresponding attacks.
I. INTRODUCTION
1.1 Hashing
Hashing converts data of any size into fixed-size data and is irreversible, unlike encryption. A
hash function ensures that two different inputs produce different hashes and makes it difficult
to reconstruct the original message from the hash (pre-image resistance).
a) MD5: This algorithm processes arbitrary-length data into a 128-bit message digest. It
breaks the input into 512-bit blocks, pads it, and appends a 64-bit representation of the
original message length. Despite its widespread use, MD5 is vulnerable to collision attacks,
although practical exploitation is currently slow.
In conclusion, while cryptographic hash functions are crucial for securing data integrity and
supporting digital signatures, their reliance on constructions like Merkle-Damgard exposes
them to potential vulnerabilities. Ongoing research aims to address these weaknesses to
ensure robust cryptographic solutions in the future.
b) **SHA-1**:
c) **SHA-2**:
Secure Hash Algorithm 2 (SHA-2) processes strings of arbitrary length into fixed-size
message digests. The SHA-2 family consists of six hash functions with hash sizes of
224, 256, 384, or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224,
and SHA-512/256. In this algorithm, the message is padded with a '1' bit followed by
as many '0' bits as needed to reach 64 bits less than a multiple of 512. A 64-bit
representation of the original message length is appended at the end of the padded
message. The padded message is processed in 512-bit blocks.
d) **SHA-3**:
4) The paper suggests prioritizing SHA algorithms over MD5 due to their superior
performance. Future research may further validate this conclusion, potentially
establishing SHA algorithms as the preferred choice among cryptographic hash
functions [5].
In the near future, advancements in computing power may render the SHA-1
hashing algorithm vulnerable to attacks, prompting major corporations like Google
and Microsoft to consider phasing it out for enhanced web security [2]. Current
assessments suggest that most integrity algorithms, except for SHA-2, exhibit
vulnerabilities, with SHA-1 being particularly susceptible to brute force attacks
despite its speed advantage over other secure hash algorithms. Although various
researchers have proposed alternatives, none have matched SHA-1's efficiency in
terms of speed or potential for internal enhancement. Consequently, there is
optimism that a future algorithm could emerge that offers superior security, efficiency,
and bit differentiation compared to existing options.
This paper discusses the suitability of various hashing algorithms, namely SHA-1,
SHA-2, SHA-3, and MD5, for specific message contexts. It acknowledges the
limitations of each algorithm in terms of security and efficiency.
Acknowledgment:
I would like to express my sincere gratitude to Prof. Shrikant Dhamdhere, our HOD,
for his invaluable guidance and support in understanding hashing algorithms. His
insights have greatly facilitated my research and expanded my knowledge in this
field.
References:
[1] G. Tejaswini Bhorkar, "A Survey of Password Attacks and Safe Hashing
Algorithms," International Research Journal of Engineering and Technology (IRJET),
Volume 04, Issue 12, December 2017.
[2] Chaitya B. Shah, Drashti R. Panchal, "Secured Hash Algorithm-1: Review Paper,"
International Journal for Advance Research in Engineering and Technology, Volume
2, Issue X, October 2014.
[3] Ankit Kumar Jain, Rohit Jones, Puru Joshi, "Survey of Cryptographic Hashing
Algorithms for Message Signing," UCST Vol. 8, Issue 2, April - June 2017.
[4] C.G Thomas, Robin Thomas Jose, "A Comparative Study on Different Hashing
Algorithms," International Journal of Innovative Research in Computer and
Communication Engineering, Vol. 3, Special Issue 7, October 2015.
[5] Surbhi Aggarwal, Neha Goyal, Kirti Aggarwal, "A Review of Comparative Study of
MD5 and SHA Security Algorithm," International Journal of Computer Applications
(0975-8887), Volume 104, No. 14, October 2014.
[7] Priyanka Vadhera, Bhumika Lall, "Review Paper on Secure Hashing Algorithm
and Its Variants," International Journal of Science and Research (IJSR), ISSN
(Online): 2319-7064, Impact Factor (2012): 3.358.
[8] Sandhya Verma, G. S. Prajapati, "A Survey of Cryptographic Hash Algorithms and
Issues," International Journal of Computer Security & Source Code Analysis
(IJCSSCA), 2015, Vol. Issue 3, ISSN (Online): 2454-5651.
III CONCLUSION
In this review, we have explored several cryptographic hash algorithms and their
underlying principles. The choice of hash algorithm depends on the specific context
and requirements of the application. Each algorithm offers unique advantages and
limitations, influencing its suitability for different scenarios. By employing various
hashing algorithms, we can ensure the integrity and security of data in diverse use
cases.