CFP last date
20 May 2024
Reseach Article

A Review of Comparative Study of MD5 and SHA Security Algorithm

by Surbhi Aggarwal, Neha Goyal, Kirti Aggarwal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 14
Year of Publication: 2014
Authors: Surbhi Aggarwal, Neha Goyal, Kirti Aggarwal
10.5120/18267-9305

Surbhi Aggarwal, Neha Goyal, Kirti Aggarwal . A Review of Comparative Study of MD5 and SHA Security Algorithm. International Journal of Computer Applications. 104, 14 ( October 2014), 1-4. DOI=10.5120/18267-9305

@article{ 10.5120/18267-9305,
author = { Surbhi Aggarwal, Neha Goyal, Kirti Aggarwal },
title = { A Review of Comparative Study of MD5 and SHA Security Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 14 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number14/18267-9305/ },
doi = { 10.5120/18267-9305 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:07.231675+05:30
%A Surbhi Aggarwal
%A Neha Goyal
%A Kirti Aggarwal
%T A Review of Comparative Study of MD5 and SHA Security Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 14
%P 1-4
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security algorithms or cryptography enables secure communication between two parties in the presence of a third-party or an eavesdropper. It assures the recipient of the message of the authenticity of the claimed source, protects the message against the unauthorized release of the message content by the adversaries, limits the access to authorized users, protects against sender/receiver denying sending/receiving a message. MD5 and Security Hash algorithms (SHA), cryptographic hash algorithms are one-way hashing functions which are easier to compute but are much harder to reverse and would take around millions of years to compute the authentic or veritable message content. This research paper aims to analyze and juxtapose the two hash algorithms, MD5 and SHA, using various key features and performance metrics. Their features have also been highlighted in order to provide the researchers a better comparison picture so that they can reach to the final upshot, which algorithm has superseded the other.

References
  1. Andrew S. Tanenbaum, Pearson Publication, Fourth edition, Computer Networks.
  2. Professor Guevara Noubir, Fundamentals of Cryptography: Algorithms, and Security Services.
  3. Wikipedia, the free encyclopedia.
  4. Jerry li, MD5 Message Digest Algorithm. San Jose University, Computer Science department
  5. Ruth Betcher, Secure Hashing Algorithm.
  6. MD5 is faster than SHA-1. Journal Of Omnifarious-Myth.
  7. William Stalling7, Fourth Edition, Cryptography and Network Security (Various Hash Algorithms).
  8. http://stackoverflow. com/questions/2948156/algorithm-complexity-security-md5-or-sha1
  9. http://idrbtca. org. in/inf_crypto. htm
  10. Addam Schroll, ITNS and CERIAS CISSP Luncheon Series: Cryptography.
  11. http://science. opposingviews. com/advantages-disadvantages-symmetric-key-encryption-2609. html
Index Terms

Computer Science
Information Sciences

Keywords

MD5 SHA hash