Abstract

This paper presents a Sponge structure modulation of the MD5 and SHA-1 hash functions. The work employs the Keccak permutation function to build the proposed scheme. The work discusses the main two security breaches that threaten the cryptography hash standards which are collision and length extension attacks. Through analyzing several examples of collided messages of both algorithms (SHA-1 and MD5), we describe the potentials to overcome the collision and length extension attacks. Moreover, a proper replacement technique to avoid such attacks is discussed in this paper.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call