S-HASH: A Crack Towards Cryptographic Hash Functions
Keywords:Cracking, HASH functions, MD5, SHA1, SHA224, SHA256, SHA384, SHA512.
S-HASH is tool based on Perl, is used to hack/crack the cryptographic hash function, which is a combination of message which is defined to be of arbitrary length and a message digest defined of fixed length. For cracking the hash values two techniques namely: dictionary attack and the brute-force attack are used. This paper presents the reviews on several hashing function (like MD5, and various types of SHA) along their cracks.
Forouzan, B. A., & Mukhopadhyay, D. (2015). Cryptography and network security. New York, NY: Mc Graw Hill Education (India) Private Limited.
Dang, Q. H. (2015). Secure hash standard.
Barker, E. B. (1995). Secure hash standard (shs).
NIST.gov - Computer Security Division - Computer Security Resource Center.
Gallagher, P., & Director, A. (1995). Secure hash standard (shs). FIPS PUB, 180, 183.