Abstract
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage. Most users are familiar with validating electronic documents based on a Hash function, such as the MD5 algorithm and other hash functions, to demonstrate the data integrity. There are many weaknesses of the current MD5 algorithm, mainly its failures and weaknesses against varying types of attacks, such as brute force attacks, rainbow table attacks, and Christmas attacks. Therefore, the method proposed in this paper enhances the MD5 algorithm by adding a dynamic variable length and a high efficiency that simulates the highest security available. Whereas the logistic system was used to encode ribonucleic acid (RNA) by generating a random matrix based on a new key that was created using the initial permutation (IP) tables used in the data encryption stander (DES) with the linear-feedback shift register (LFSR), this work proposes several structures to improve the MD5 hash function. The experimental results demonstrate its high resistance to hackers while maintaining a suitable duration. This paper discusses the design of a confident hash algorithm. This algorithm has characteristics that enable it to succeed in the field of digital authentication and data integrity.
Highlights
The large interest in information security has centered on the balanced protection of the confidentiality, integrity and availability of data, with the amount of data required to be analyzed and provided for protection continuously varying with every case
It is dependent on computer methods [1]–[6]. It can store and retain sensitive and important information and data securely by eliminating data fraud, enhancing data safety and security. This is done by using the Hash function, which in turn provides high protection and privacy to the user, e.g., the message digest algorithm, which can be abbreviated as ‘‘MD5’’ and is a one-way cryptographic function used in various fields for maintenance and to demonstrate data integrity
EXPERIMENTAL RESULTS The results of the experiment show that even if the time taken for the proposed algorithm is relatively more in relation to the required level of safety, it will exclude any of the techniques used in the hybridization algorithm, such as the key creation method and use of the coding method that used Ribonucleic acid (RNA) or the use of chaos theory, such as Brute force and other Attacks
Summary
The large interest in information security has centered on the balanced protection of the confidentiality, integrity and availability of data, with the amount of data required to be analyzed and provided for protection continuously varying with every case. Since there is a limited number of trained and experienced personnel that are able to verify the validity of these biases manually, it is necessary to find an efficient and inexpensive method, one that does not require vast experience or an advanced level of training. It is dependent on computer methods [1]–[6].
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.