Papers

SECURITY OF CRYPTOGRAPHIC ALGORITHM SHA AND MD5 (Pages : 28 - 33)

M.K. ISLAM, M.A. HOSSAIN AND M.A. NASHIRY

Cryptography is a system of secret communication to improve the security of information. There are three kinds of cryptographic algorithm. They are hash functions algorithm, secret key functions algorithm and public key functions algorithm. Hash functions algorithms such as MD4, MD5, SHA, RIPEMD, TIGER, RIPEMD-160 are most widely used in commercial as well as defense applications. Since their design paradigm is based on “trial-and-error” process, they need to have good cryptanalysis effort. Among hash algorithms, SHA and MD5 are most popular. In this paper, a postmortem analysis has been done on two popular hash functions cryptographic algorithms SHA and MD5. This paper shows the security measure and different kinds of attacks on these two algorithms.Download


Latest News

Upcoming Issue: International Journal of Sustainable Crop Production, Volume 14 Issue 1, May 2019
Upcoming Issue: International Journal of Experimental Agriculture, Volume 9 Issue 2, May 2019
Upcoming Issue: Journal of Innovation and Development Strategy, Volume 13 Issue 1, August 2019
Upcoming Issue: Institutional Engineering and Technology, Volume 7 Issue 1, August 2019
Upcoming Issue: Journal of Soil and Nature, Volume 10 Issue 1, November 2019
Upcoming Issue: Marine Resources and Aquaculture, Volume 4 Issue 1, November 2019

Contact Us

Green Global

+880 1712 068306


Green Global

editorATggfjournalsDOTcom rajuakhtar8ATgmailDOTcom