Views: 132 , Downloads: 117 | CTR: 89 % | Weekly Hits: ⮙4
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014
Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt
Pradeep Singh Solanki, Vinit Agarwal
Hashing based algorithms are the most commonly used method to strain passwords into hashes which are theoretically non decipherable. This paper proposes a new method and analyses of implementing one more tier to the message digest 5 algorithm using an enhancement of IDEA algorithm, a potential salt by the developer and an basic method to peruse a new root method to set the pattern for two roots as salt into the message digest 5 algorithm.
Keywords: Data integrity, Authentication, Message Digest, Hashes
Edition: Volume 3 Issue 7, July 2014
Pages: 2224 - 2226
How to Cite this Article?
Pradeep Singh Solanki, Vinit Agarwal, "Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201572, Volume 3 Issue 7, July 2014, 2224 - 2226
132 PDF Views | 117 PDF Downloads
Similar Articles with Keyword 'Data integrity'
Views: 103 , Downloads: 83 | CTR: 81 % | Weekly Hits: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1251 - 1256IT Auditing and its Standards
Dr D S Kushwaha, Ankur Singh
Views: 132 , Downloads: 100 | CTR: 76 % | Weekly Hits: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Views: 145 , Downloads: 102 | CTR: 70 % | Weekly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Views: 128 , Downloads: 103 | CTR: 80 % | Weekly Hits: ⮙2 | Monthly Hits: ⮙10
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1989 - 1992Privacy-Preservation and Public Auditing for Cloud Data - A Survey
S Archana, Ananthi J
Views: 125 , Downloads: 104 | CTR: 83 % | Weekly Hits: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2467 - 2469Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud
Shazadi Fatima Rizvi, A. N. Jaiswal
Similar Articles with Keyword 'Authentication'
Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Hits: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Views: 139 , Downloads: 99 | CTR: 71 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2338 - 2340Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar
Views: 154 , Downloads: 99 | CTR: 64 % | Weekly Hits: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Views: 132 , Downloads: 99 | CTR: 75 % | Monthly Hits: ⮙12
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Views: 119 , Downloads: 99 | CTR: 83 %
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1760 - 1762A Survey on Existing Password Storage Methods and their Security
Samruddhi Patil, Kumud Wasnik
Similar Articles with Keyword 'Message Digest'
Views: 138 , Downloads: 106 | CTR: 77 % | Weekly Hits: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
Views: 132 , Downloads: 117 | CTR: 89 % | Weekly Hits: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 2224 - 2226Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt
Pradeep Singh Solanki, Vinit Agarwal
Views: 145 , Downloads: 120 | CTR: 83 % | Weekly Hits: ⮙1
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 632 - 634Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm
Jissmol T Antony, Gopal B
Views: 144 , Downloads: 125 | CTR: 87 % | Weekly Hits: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016
Pages: 1201 - 1208An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks
Sindu.B, S. Sathya Priya
Views: 183 , Downloads: 125 | CTR: 68 % | Monthly Hits: ⮙13
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019
Pages: 1579 - 1582Enhancing Security and Speed of Sha-192 with Higher Avalanche
Sushama Ingale, Arun Jhapate
Similar Articles with Keyword 'Hashes'
Views: 132 , Downloads: 117 | CTR: 89 % | Weekly Hits: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 2224 - 2226Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt
Pradeep Singh Solanki, Vinit Agarwal
Views: 135 , Downloads: 117 | CTR: 87 % | Weekly Hits: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 1683 - 1686Review on Honey Encryption Technique
Nahri Syeda Noorunnisa, Dr. Khan Rahat Afreen