MD5 Secured Cryptographic Hash Value

Over the past two decades, significant researches have been done in analyzing the MD5 algorithm to address its collision problem. This paper enhanced the original MD5 by adding four logical operations to increase the security of the message to become free from collision attack. To test the enhanced algorithm, different data with collision problems using the MD5 Collision generator were used. The avalanche effect was measured, and the result provided more than 50%-bit change. The enhanced MD5 was also tested against dictionary attack using online cracking tools and these tools failed to crack and revert the message digest into plain text. Overall, the enhanced algorithm mitigated the collision problem of MD5.

[1]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[2]  Wilson Cheruiyot,et al.  Enhanced Message Digest Version 5 Architecture for Secure Hashing , 2014 .

[3]  Akash Kumar Mandal,et al.  Analysis of Avalanche Effect in Plaintext of DES using Binary Codes , 2012 .

[4]  Neyole Misiko Jacob Vulnerability of data security using MD5 function in php database design , 2015 .

[5]  Antoon Bosselaers,et al.  Collisions for the Compressin Function of MD5 , 1994, EUROCRYPT.

[6]  Dengguo Feng,et al.  Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..

[7]  Lars R. Knudsen,et al.  Some Attacks Against a Double Length Hash Proposal , 2005, ASIACRYPT.

[8]  Marc Stevens Attacks on Hash Functions and Applications , 2012 .

[9]  M. Kaps,et al.  Concepts of experimental design. , 2004 .

[10]  Jidong Jin,et al.  Research for the application and safety of MD5 algorithm in password authentication , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[11]  Yu Sasaki,et al.  Finding Preimages in Full MD5 Faster Than Exhaustive Search , 2009, EUROCRYPT.

[12]  Vlastimil Klíma,et al.  Tunnels in Hash Functions: MD5 Collisions Within a Minute , 2006, IACR Cryptol. ePrint Arch..

[13]  Sjsu ScholarWorks,et al.  A Meaningful MD5 Hash Collision Attack , 2014 .

[14]  Marc Stevens,et al.  Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate , 2009, CRYPTO.

[15]  A. K. Mandal,et al.  Comparative study of Avalanche effect in DES using binary codes , 2012, 2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS.

[16]  Xie Nan-bin,et al.  The Mixed Encryption Algorithm Based on MD5 and XOR Transformation , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[17]  M.D.A. Chawdhury,et al.  Security enhancement of MD5 hashed passwords by using the unused bits of TCP header , 2008, 2008 11th International Conference on Computer and Information Technology.