Affiliation:
1. King Fahd University of Petroleum and Minerals, Saudi Arabia
Abstract
A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoffs between performance and security of cryptographic hash functions on mobile devices due to their limited computational power. The researchers in this paper study the most common cryptographic hash functions and highlights the tradeoffs between their performance and security. The hash functions considered in this study are MD4, MD5, Whirlpool, and the hash functions in the SHA family. The security of these hash functions is compared based on recent attacks in terms of collision resistance, preimage attacks, and sensitivity analysis. While the performance is tested on different input block sizes, useful observations and recommendations are made based on the results of this study.
Subject
Computer Networks and Communications
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design and Implementation of Secure Hash Function Based on Parallel Structure;Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management;2023-11-24
2. Performance Test of Hash Functions in Proof of Work Schemes in Blockchain;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22
3. An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup;International Journal of Cloud Applications and Computing;2022-09-16