Skip to main content
main-content
Top

Hint

Swipe to navigate through the chapters of this book

2021 | OriginalPaper | Chapter

Multiple Hashing Using SHA-256 and MD5

Authors: Gautham P. Reddy, Anoop Narayana, P. Karan Keerthan, B. Vineetha, Prasad Honnavalli

Published in: Advances in Computing and Network Communications

Publisher: Springer Singapore

share
SHARE

Abstract

Message Digest 5 (MD5) is a hashing function with numerous vulnerabilities such as pre-image vulnerability and collision vulnerability which restrict the usage of MD5. Therefore, by using other hashing functions such as SHA prior to hashing with MD5, we can use MD5 for various applications such as data integrity without compromising the security of the hash. MD5 is widely used in file transfer or storage applications because it produces a smaller hash value of 128 bits when compared with other hashing algorithms. Also, it is simpler to implement in hardware and as a program. We propose a technique of hashing the original message (or string) with secure hashing algorithms such as SHA-256 followed by hashing the hash value of SHA-256 with MD5 to get the resultant hash which is less prone to various security attacks such as collision attacks. By hashing the string twice, we make it more secure and tackle the pre-image vulnerability and collision vulnerability of MD5. This makes the hashing algorithm more secure for file transfer applications. Multiple iterations will produce more secure hash values but our simulation uses two iterations, where we upload a file onto a cloud server and check if it has been tampered with or modified.
Literature
1.
go back to reference L. Jie, Improved collision attack on MD5. J. Comput. Sci. Technol. ACM DL digital library (2007) L. Jie, Improved collision attack on MD5. J. Comput. Sci. Technol. ACM DL digital library (2007)
3.
go back to reference W. Stallings, Cryptography and Network Security: Principles and Practice (Tsinghua University Press, Beijing, 2002). W. Stallings, Cryptography and Network Security: Principles and Practice (Tsinghua University Press, Beijing, 2002).
4.
go back to reference R.L. Rivest, The MD5 Message Digest Algorithm [EB/OL] (2005) R.L. Rivest, The MD5 Message Digest Algorithm [EB/OL] (2005)
5.
go back to reference Secure Hash Standard (SHS), N. I. of Standards and Technology (2012) Secure Hash Standard (SHS), N. I. of Standards and Technology (2012)
Metadata
Title
Multiple Hashing Using SHA-256 and MD5
Authors
Gautham P. Reddy
Anoop Narayana
P. Karan Keerthan
B. Vineetha
Prasad Honnavalli
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-33-6977-1_47