Security

Security Review of the SHA-1 and MD5 Cryptographic Hash Algorithms

Download Now Free registration required

Executive Summary

Database breaches and reverse engineering of hashed passwords accentuated lackluster approach of administrators maintaining sensitive data. The authors therefore evaluate the most-commonly utilized hashing algorithm, SHA-1 and MD5, as to their ability to withstand various threat scenarios. A comprehensive literature research will be presented which supports the hypothesis that security considerations when implementing cryptographic hash functions are sidelined in favor of backward-compatible procedures with provably lower level of resilience in face of deliberate attempts at obtaining sensitive data by unauthorized third parties.

  • Format: PDF
  • Size: 342.6 KB