Performance and Security Tradeoffs in Cryptographic Hash Functions

Performance and Security Tradeoffs in Cryptographic Hash Functions

Sultan Almuhammadi, Omar Mohammed Bawazeer
DOI: 10.4018/IJITN.2020100103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoffs between performance and security of cryptographic hash functions on mobile devices due to their limited computational power. The researchers in this paper study the most common cryptographic hash functions and highlights the tradeoffs between their performance and security. The hash functions considered in this study are MD4, MD5, Whirlpool, and the hash functions in the SHA family. The security of these hash functions is compared based on recent attacks in terms of collision resistance, preimage attacks, and sensitivity analysis. While the performance is tested on different input block sizes, useful observations and recommendations are made based on the results of this study.
Article Preview
Top

2. Cryptography And Network Security

Cryptography performs a significant part in securing the confidential information in different applications such as medical databases, e-commerce, email, e-banking, etc. It also plays a major role in network security applications, including: confidentiality, integrity, and availability (Forouzan, 2008).

Confidentiality: ensures the privacy of data in such a way that no one can read the message unless authorized.

Integrity: means that any change or modification must be done by the authorized entities.

Availability: means that the information must be available for the authorized entities.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 1 Issue (2022)
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing