S-HASH: A Crack Towards Cryptographic Hash Functions
DOI:
https://doi.org/10.30732/CSVTURJ.20211001005Keywords:
Cracking, HASH functions, MD5, SHA1, SHA224, SHA256, SHA384, SHA512.Abstract
S-HASH is tool based on Perl, is used to hack/crack the cryptographic hash function, which is a combination of message which is defined to be of arbitrary length and a message digest defined of fixed length. For cracking the hash values two techniques namely: dictionary attack and the brute-force attack are used. This paper presents the reviews on several hashing function (like MD5, and various types of SHA) along their cracks.
References
Forouzan, B. A., & Mukhopadhyay, D. (2015). Cryptography and network security. New York, NY: Mc Graw Hill Education (India) Private Limited.
Dang, Q. H. (2015). Secure hash standard.
Barker, E. B. (1995). Secure hash standard (shs).
NIST.gov - Computer Security Division - Computer Security Resource Center.
Gallagher, P., & Director, A. (1995). Secure hash standard (shs). FIPS PUB, 180, 183.