A New Approach in Expanding the Hash Size of MD5

The enhanced MD5 algorithm has been developed by expanding its hash value up to 1280 bits from the original size of 128 bit using XOR and AND operators. Findings revealed that the hash value of the modified algorithm was not cracked or hacked during the experiment and testing using powerful bruteforce, dictionary, cracking tools and rainbow table such as CrackingStation, Hash Cracker, Cain and Abel and Rainbow Crack which are available online thus improved its security level compared to the original MD5. Furthermore, the proposed method could output a hash value with 1280 bits with only 10.9 ms additional execution time from MD5. Keywords: MD5 algorithm, hashing, client-server communication, modified MD5, hacking, bruteforce, rainbow table.

[1]  Gurpreet Singh,et al.  Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.

[2]  M. Eshghi,et al.  Design of an ASIP processor for MD5 hash algorithm , 2012, 2012 20th Telecommunications Forum (TELFOR).

[3]  Abhirup Khanna,et al.  Cloud security ecosystem for data security and privacy , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.

[4]  Jitendra Agrawal,et al.  New Modified 256-bit MD5 Algorithm with SHA Compression Function , 2012 .

[5]  T. Sasilatha,et al.  Performance analysis of black hole attack detection scheme using MD5 algorithm in WSN , 2014, 2014 International Conference on Smart Structures and Systems (ICSSS).

[6]  Shadi Ismail Nashwan SE-H: A Secure and Efficient Hash Protocol for RFID System , 2017, Int. J. Commun. Networks Inf. Secur..

[7]  Keonwoo Kim,et al.  Efficient implementation of MD5 algorithm in password recovery of a PDF file , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).

[8]  P. W. C. Prasad,et al.  Enhancement of MD5 Algorithm for Secured Web Development , 2017, J. Softw..

[9]  Seung-Il Sonh A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms , 2012 .

[10]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[11]  M.D.A. Chawdhury,et al.  Security enhancement of MD5 hashed passwords by using the unused bits of TCP header , 2008, 2008 11th International Conference on Computer and Information Technology.

[12]  Marc Stevens,et al.  Chosen-prefix collisions for MD5 and applications , 2012, Int. J. Appl. Cryptogr..

[13]  Vishwanath S. Mahalle,et al.  Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm , 2014, 2014 International Conference on Power, Automation and Communication (INPAC).

[14]  Wanggen Wan,et al.  Javaweb login authentication based on improved MD5 algorithm , 2016, 2016 International Conference on Audio, Language and Image Processing (ICALIP).

[15]  Eko Sediyono,et al.  Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[16]  Amita Pandey,et al.  A Modified Approach For Cryptograpic Hash Function Based On MD5 Algorithm , 2013 .

[17]  Dhananjay Kumar,et al.  Rainbow table to crack password using MD5 hashing algorithm , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[18]  Zhao Shun Wang,et al.  Security Analysis of MD5 Algorithm in Password Storage , 2013 .

[19]  Wang Xi-jin,et al.  The Application Research of MD5 Encryption Algorithm in DCT Digital Watermarking , 2012 .

[20]  Shruti Gupta,et al.  Enhancement of security mechanism for confidential data using AES-128, 192 and 256bit encryption in cloud , 2015, 2015 1st International Conference on Next Generation Computing Technologies (NGCT).

[21]  Sumita Tyagi,et al.  A New Improved and Secure Version of MD5 , 2014 .

[22]  Canqun Yang,et al.  Constant memory optimizations in MD5 Crypt cracking algorithm on GPU-accelerated supercomputer using CUDA , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).

[23]  S Nagarajan,et al.  A Modified MD5 Algorithm for Wireless Networks , 2012 .

[24]  Vandana Pandey,et al.  Architecture based on MD5 and MD5-512 Bit Applications , 2013 .

[25]  Jidong Jin,et al.  Research for the application and safety of MD5 algorithm in password authentication , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[26]  Yu Sasaki,et al.  Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC , 2015 .

[27]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[28]  Zurina Mohd Hanapi,et al.  A framework based on RSA and AES encryption algorithms for cloud computing services , 2014, 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014).

[29]  Ioannis Papaefstathiou,et al.  Implementing Rainbow Tables in High-End FPGAs for Super-Fast Password Cracking , 2010, 2010 International Conference on Field Programmable Logic and Applications.