A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage. Most users are familiar with validating electronic documents based on a Hash function, such as the MD5 algorithm and other hash functions, to demonstrate the data integrity. There are many weaknesses of the current MD5 algorithm, mainly its failures and weaknesses against varying types of attacks, such as brute force attacks, rainbow table attacks, and Christmas attacks. Therefore, the method proposed in this paper enhances the MD5 algorithm by adding a dynamic variable length and a high efficiency that simulates the highest security available. Whereas the logistic system was used to encode ribonucleic acid (RNA) by generating a random matrix based on a new key that was created using the initial permutation (IP) tables used in the data encryption stander (DES) with the linear-feedback shift register (LFSR), this work proposes several structures to improve the MD5 hash function. The experimental results demonstrate its high resistance to hackers while maintaining a suitable duration. This paper discusses the design of a confident hash algorithm. This algorithm has characteristics that enable it to succeed in the field of digital authentication and data integrity.

[1]  Mourade Azrour,et al.  A New Secure SIP Authentication Scheme Based on Elliptic Curve Cryptography , 2017, ICIT 2017.

[2]  Ariel M. Sison,et al.  A Modified MD5 Algorithm Incorporating Hirose Compression Function , 2018, 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM).

[3]  Di Xiao,et al.  Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules , 2018, Multimedia Tools and Applications.

[4]  Behrooz Khadem,et al.  An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack , 2018, ArXiv.

[5]  R. B. Patel,et al.  Capacity and interference aware link scheduling with channel assignment in wireless mesh networks , 2011, J. Netw. Comput. Appl..

[6]  Miss Manorama Chauhan An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5 , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[7]  Xiaowen Zhang,et al.  Modern Network Security Practices: Using Rainbow Tables to Solve Organizational Issues , 2018, 2018 IEEE 39th Sarnoff Symposium.

[8]  Xiaowen Zhang,et al.  Finding partial hash collisions by brute force parallel programming , 2017, 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[9]  R. B. Patel,et al.  A Framework for Distributed Dynamic Load Balancing in Heterogeneous Cluster , 2007 .

[10]  Rasha Subhi Ali,et al.  Enhancement CAST block algorithm to encrypt big data , 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT).

[11]  Christoforos Ntantogian,et al.  Evaluation of password hashing schemes in open source web platforms , 2019, Comput. Secur..

[12]  Shefali Ojha,et al.  AES and MD5 based secure authentication in cloud computing , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[13]  P. W. C. Prasad,et al.  Enhancement of MD5 Algorithm for Secured Web Development , 2017, J. Softw..

[14]  Jyoti Gupta,et al.  A novel technique of cloud security based on hybrid encryption by Blowfish and MD5 , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).

[15]  Pan Wang,et al.  An Improved Bloom Filter in Distributed Crawler , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[16]  Aman Shakya,et al.  Enhancing MD5 hash algorithm using symmetric key encryption , 2019, ICCSP.

[17]  Vaclav Prenosil,et al.  Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA , 2019, 2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID).

[18]  Larry B. de Guzman,et al.  MD5 Secured Cryptographic Hash Value , 2018, MLMI2018.

[19]  Risanuri Hidayat,et al.  Increasing the security of mp3 steganography using AES Encryption and MD5 hash function , 2016, 2016 2nd International Conference on Science and Technology-Computer (ICST).

[20]  Wayne Goodridge,et al.  A Survey of Network-based Security Attacks , 2019, International Journal of Advanced Networking and Applications.

[21]  Athanasios V. Vasilakos,et al.  A Multi-Tenant Cloud-Based DC Nano Grid for Self-Sustained Smart Buildings in Smart Cities , 2017, IEEE Communications Magazine.

[22]  F Alaa Kadhim,et al.  Mouse Movement with 3D Chaotic Logistic Maps to Generate Random Numbers , 2017 .

[23]  Himshai Kambo,et al.  Secure data deduplication mechanism based on Rabin CDC and MD5 in cloud computing environment , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[24]  Samee Ullah Khan,et al.  The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).

[25]  Mohammed Ali,et al.  DB Protection System Depend on Modified Hash Function , 2017 .

[26]  Batyr Charyyev,et al.  RIVA: Robust Integrity Verification Algorithm for High-Speed File Transfers , 2020, IEEE Transactions on Parallel and Distributed Systems.

[27]  Priyanka Ora,et al.  Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography , 2015, 2015 International Conference on Computer, Communication and Control (IC4).

[28]  Alaa Kadhim Farhan,et al.  Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document , 2020, IEEE Access.

[29]  Alaa Kadhim Farhan,et al.  A New S-Box Generation Algorithm Based on Multistability Behavior of a Plasma Perturbation Model , 2019, IEEE Access.

[30]  Ariel M. Sison,et al.  A New Approach in Expanding the Hash Size of MD5 , 2018, Int. J. Commun. Networks Inf. Secur..

[31]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[32]  Irfan A. Landge,et al.  Secured IoT Through Hashing Using MD5 , 2018, 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).