S-HASH: A Crack Towards Cryptographic Hash Functions

Authors

  • Kaushal Jangid Chhattisgarh Swami Vivekanand Technical University, Bhilai, Chhattisgarh 491107, India.
  • Vidushi Department of Computer Science and Engineering, HMR Institute of Technology and Management Bakoli HMRITM Rd, Hamidpur, New Delhi, Delhi 110036, India.

Keywords:

Cracking, HASH functions, MD5, SHA1, SHA224, SHA256, SHA384, SHA512.

Abstract

S-HASH is tool based on Perl,  is used to hack/crack the cryptographic hash   function, which is a combination of message which is defined to be of arbitrary length and a message digest defined of fixed length. For cracking the hash values two techniques namely: dictionary attack and the brute-force attack are used. This paper presents the reviews on several hashing function (like MD5, and various types of SHA) along their cracks.

References

Forouzan, B. A., & Mukhopadhyay, D. (2015). Cryptography and network security. New York, NY: Mc Graw Hill Education (India) Private Limited.

Dang, Q. H. (2015). Secure hash standard.

Barker, E. B. (1995). Secure hash standard (shs).

NIST.gov - Computer Security Division - Computer Security Resource Center.

Gallagher, P., & Director, A. (1995). Secure hash standard (shs). FIPS PUB, 180, 183.

Published

2021-11-22

How to Cite

Jangid, K., & Vidushi. (2021). S-HASH: A Crack Towards Cryptographic Hash Functions . CSVTU Research Journal, 10(01). Retrieved from http://csvtujournal.in/index.php/rjet/article/view/142