Reducing Hash Function Complexity: MD5 and SHA-1 as Examples
Author(s) -
Yousef Alhammadi,
Mohamed Fadl Idris
Publication year - 2019
Publication title -
international journal of mathematical sciences and computing
Language(s) - English
Resource type - Journals
eISSN - 2310-9033
pISSN - 2310-9025
DOI - 10.5815/ijmsc.2019.01.01
Subject(s) - hash function , md5 , computer science , cryptographic hash function , sha 2 , function (biology) , collision attack , theoretical computer science , algorithm , double hashing , computer security , evolutionary biology , biology
Hash functions algorithms also called message digest algorithms, compress a message input of an arbitrary length, and produce an output with a fixed length that is distributed randomly. Several hash algorithms exist such as Md5 and SHA1. These algorithms verify data integrity and restrict unauthorized data modification. However, they experience some complexities, especially when implemented in bitcoin mining, and low computation devices, in particularly IoT devices. As a remedy, this paper suggests a new compression function that reduces the complexity of the hash function algorithms such as MD5 and SHA-1. Also, proves that we can obtain the same results which are achieved by the original compression function.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom