Improved MD5 through the extension of 1024 Message Input Block

MD5 cryptographic hash function is greatly affected by collision vulnerability and as a result dramatically affects not only the security of the message but most importantly the integrity of the data. In this study, a new method for the padding process of the original message was introduced and additional operations on the internal processes are implemented. The result of the computing simulation indicates that the extension of the message block from 512 to 1024-bit blocks and expansion of the length of the resulting value per round from 32 to 64 bits together with added operations increases the security of the modified message digest hash function. An evaluation on the produced hash value has been conducted using the avalanche effect test that resulted to a value of 56.91 and randomness test to assess the randomization value into which a remarkable output of 56.45 and 55.93 respectively has been obtained into which it has considerably been attested that collision concern has been addressed.

[1]  Muhammad Salman,et al.  Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system , 2013, 2013 International Conference on QiR.

[2]  J. Aparna,et al.  Image watermarking scheme based on MD5 and simplified DES , 2014, 2014 First International Conference on Computational Systems and Communications (ICCSC).

[3]  Jidong Jin,et al.  Research for the application and safety of MD5 algorithm in password authentication , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[4]  Meng-jiao Wang,et al.  Hash Function with Variable Output Length , 2015, 2015 International Conference on Network and Information Systems for Computers.

[5]  Wanggen Wan,et al.  Javaweb login authentication based on improved MD5 algorithm , 2016, 2016 International Conference on Audio, Language and Image Processing (ICALIP).

[6]  Eko Sediyono,et al.  Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[7]  Ary Setijadi Prihatmanto,et al.  HASH MD5 function implementation at 8-bit microcontroller , 2013, 2013 Joint International Conference on Rural Information & Communication Technology and Electric-Vehicle Technology (rICT & ICeV-T).

[8]  Dhananjay Kumar,et al.  Rainbow table to crack password using MD5 hashing algorithm , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[9]  Bingru Yang,et al.  Design and implementation for MD5-based data integrity checking system , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.

[10]  Adam Ziebinski,et al.  Hardware implementation of the MD5 algorithm , 2009, PDeS.

[11]  Yueming Lu,et al.  A method based on MD5 and time for preventing deception in electronic commerce , 2014 .

[12]  H. Mirvaziri,et al.  A new Hash Function Based on Combination of Existing Digest Algorithms , 2007, 2007 5th Student Conference on Research and Development.

[13]  Priyanka Ora,et al.  Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography , 2015, 2015 International Conference on Computer, Communication and Control (IC4).

[14]  Xiaowen Zhang,et al.  Finding partial hash collisions by brute force parallel programming , 2017, LISAT 2017.

[15]  Mitsugu Iwamoto,et al.  Meet-in-the-middle preimage attacks revisited new results on MD5 and HAVAL , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[16]  M.D.A. Chawdhury,et al.  Security enhancement of MD5 hashed passwords by using the unused bits of TCP header , 2008, 2008 11th International Conference on Computer and Information Technology.

[17]  Subhabrata Mukherjee,et al.  An Efficient Cryptographic Hash Algorithm (BSA) , 2012, ArXiv.

[18]  Joseph Sterling Grah Hash functions in Cryptography , 2008 .

[19]  Hu Ming,et al.  MD5-Based Error Detection , 2009, 2009 Pacific-Asia Conference on Circuits, Communications and Systems.

[20]  Benjamin Grégoire,et al.  Verified Security of Merkle-Damgård , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.

[21]  Zhenqi Wang,et al.  Implementation and Comparison of Two Hash Algorithms , 2013, 2013 International Conference on Computational and Information Sciences.

[22]  Xie Nan-bin,et al.  The Mixed Encryption Algorithm Based on MD5 and XOR Transformation , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[23]  A. K. Dubey,et al.  Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment , 2012, 2012 CSI Sixth International Conference on Software Engineering (CONSEG).

[24]  Piyush Gupta,et al.  A Comparative Analysis of SHA and MD 5 Algorithm , 2014 .

[25]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[26]  Bhale Pradeepkumar Gajendra,et al.  Achieving cloud security using third party auditor, MD5 and identity-based encryption , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[27]  Keonwoo Kim,et al.  Efficient implementation of MD5 algorithm in password recovery of a PDF file , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).

[28]  Nabil A. Ismail,et al.  An efficient message digest algorithm (MD) for data security , 2001, Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology. TENCON 2001 (Cat. No.01CH37239).