Kontaktujte nás | Jazyk: čeština English
dc.title | SHA-1 and MD5 cryptographic hash functions: Security overview | en |
dc.contributor.author | Jašek, Roman | |
dc.relation.ispartof | Komunikácie | |
dc.identifier.issn | 1335-4205 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.date.issued | 2015 | |
utb.relation.volume | 17 | |
utb.relation.issue | 1 | |
dc.citation.spage | 73 | |
dc.citation.epage | 80 | |
dc.type | article | |
dc.language.iso | en | |
dc.publisher | University of Zilina | |
dc.subject | Algorithm | en |
dc.subject | Bcypt | en |
dc.subject | Function | en |
dc.subject | Hashing | en |
dc.subject | MD5 | en |
dc.subject | PBKDF2 | en |
dc.subject | Scrypt | en |
dc.subject | Security | en |
dc.subject | SHA-1 | en |
dc.description.abstract | Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers. In the article, we present a security overview of both algorithms and demonstrate the necessity to abandon them in favor of more resilient alternatives due to low computational requirements necessary to reverse engineer the message digests, or to future proof security due to advances in hardware performance and scalability. Suitability procedures and their methods of use are part of this article. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1004517 | |
utb.identifier.obdid | 43874524 | |
utb.identifier.scopus | 2-s2.0-84921868598 | |
utb.source | j-scopus | |
dc.date.accessioned | 2015-05-28T11:39:07Z | |
dc.date.available | 2015-05-28T11:39:07Z | |
utb.contributor.internalauthor | Jašek, Roman |