Implementation and Comparative Analysis of RSA and MD5 Algorithm

In this paper, we have made a comparative analysis of RSA Algorithm and a hash algorithm i.e., MD5 (Message Digest 5). Although the commonly used hash algorithms in the field of information security are MD5 and SHA-1 which evolved from MD4. We have implemented the logic of these algorithms in Java, and try to find something new and ended with the conclusion.

[1]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[2]  Keonwoo Kim,et al.  Efficient implementation of MD5 algorithm in password recovery of a PDF file , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).

[3]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[4]  Zhenqi Wang,et al.  Implementation and Comparison of Two Hash Algorithms , 2013, 2013 International Conference on Computational and Information Sciences.

[5]  Dan Boneh,et al.  TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .

[6]  William Stallings,et al.  Cryptography and network security , 1998 .

[7]  Kaoru Kurosawa,et al.  Small Secret Key Attack on a Variant of RSA (Due to Takagi) , 2008, CT-RSA.

[8]  Muhammad Salman,et al.  Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system , 2013, 2013 International Conference on QiR.

[9]  Dengguo Feng,et al.  Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..

[10]  Cryptosystem Dan Boneh Twenty Years of Attacks on the RSA , 1999 .

[11]  Musheer Ahmad,et al.  Digital image authentication and encryption using digital signature , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[12]  Laurent Nana,et al.  A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling , 2013, 2013 European Modelling Symposium.

[13]  Xiaoyun Wang,et al.  How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.

[14]  Hu Ming,et al.  The Collision Rate Tests of Two Known Message Digest Algorithms , 2009, 2009 International Conference on Computational Intelligence and Security.

[15]  Aloka Sinha,et al.  A technique for image encryption using digital signature , 2003 .

[16]  Sattar J Aboud,et al.  An efficient method for attack RSA scheme , 2009, 2009 Second International Conference on the Applications of Digital Information and Web Technologies.

[17]  Zhao Yong-Xia,et al.  MD5 Research , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[18]  Hancheng Liao Image Retrieval Based on MD5 , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.

[19]  Jitendra Agrawal,et al.  New Modified 256-bit MD5 Algorithm with SHA Compression Function , 2012 .