S-HASH: A Crack Towards Cryptographic Hash Functions


  • Kaushal Jangid Chhattisgarh Swami Vivekanand Technical University, Bhilai, Chhattisgarh 491107, India.
  • Vidushi Department of Computer Science and Engineering, HMR Institute of Technology and Management Bakoli HMRITM Rd, Hamidpur, New Delhi, Delhi 110036, India.


Cracking, HASH functions, MD5, SHA1, SHA224, SHA256, SHA384, SHA512.


S-HASH is tool based on Perl,  is used to hack/crack the cryptographic hash   function, which is a combination of message which is defined to be of arbitrary length and a message digest defined of fixed length. For cracking the hash values two techniques namely: dictionary attack and the brute-force attack are used. This paper presents the reviews on several hashing function (like MD5, and various types of SHA) along their cracks.


Forouzan, B. A., & Mukhopadhyay, D. (2015). Cryptography and network security. New York, NY: Mc Graw Hill Education (India) Private Limited.

Dang, Q. H. (2015). Secure hash standard.

Barker, E. B. (1995). Secure hash standard (shs).

NIST.gov - Computer Security Division - Computer Security Resource Center.

Gallagher, P., & Director, A. (1995). Secure hash standard (shs). FIPS PUB, 180, 183.



How to Cite

Jangid, K., & Vidushi. (2021). S-HASH: A Crack Towards Cryptographic Hash Functions . CSVTU Research Journal, 10(01). Retrieved from http://csvtujournal.in/index.php/rjet/article/view/142