You are here

» An in-depth look at cryptographic hashing algorithms

An in-depth look at cryptographic hashing algorithms

Description
Creator: 

Jonathan Krotkiewicz

Responsibility: 
Start Date: 
2016 April 1
End Date: 
2016 April 1
Date Range: 
2016 April 1
Language: 
English
Physical Description: 

0.9 cm of textual records

Notes: 

Audience: Undergraduate. -- Dissertation: Thesis (B. A.). -- Algoma University, 2016. -- Submitted in partial fulfillment of course requirements for COSC 4235. -- Includes figures. -- Contents: Thesis.

ABSTRACT -- Cryptographic hash functions, namely Message Digest 5 and Secure Hash Algorithm 1 were published over two decades ago and are still in frequent practice as a password security measure. Since publication, associated weaknesses and vulnerabilities have been identified with each function. From an information security perspective, the algorithms on their own are considered broken and insecure respectively. The presented literature seeks to illustrate the degree of vulnerability associated with the credited algorithms through extensive research, relevant statistical data, and firsthand experimentation. Well known attack methods such as a dictionary and rainbow table attacks are undertaken against a set of MD5 and SHA-1 hash values in a real environment to extract significant data regarding time and space complexity. The data are used in comparison to approximated results of secure cryptographic hashing standards in practice today. Consequently, information to counteract such attack methods is discussed in detail to proactively prevent the likelihood of a successful data breach in a real system.

Media
Scan Resolution: 
Scan Date: 
Scale: 
Master scans folder location: 
Bibliographic Information
Publication: 
Volume: 
Issue: 
Standard No: 
Physical Location
rec_shelfloc: 
2016-016-001
Repository: 
Algoma University Archive
Container Number: 
001
Conservation
Custodial History: 
Style or Pattern: 
Process: 
Marks: 
Description Level: 
Conservation-Treatment
Conclusions: 
Storage Method: