Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 132 , Downloads: 117 | CTR: 89 % | Weekly Hits: ⮙4

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt

Pradeep Singh Solanki, Vinit Agarwal

Hashing based algorithms are the most commonly used method to strain passwords into hashes which are theoretically non decipherable. This paper proposes a new method and analyses of implementing one more tier to the message digest 5 algorithm using an enhancement of IDEA algorithm, a potential salt by the developer and an basic method to peruse a new root method to set the pattern for two roots as salt into the message digest 5 algorithm.

Keywords: Data integrity, Authentication, Message Digest, Hashes

Edition: Volume 3 Issue 7, July 2014

Pages: 2224 - 2226

Share this Article

How to Cite this Article?

Pradeep Singh Solanki, Vinit Agarwal, "Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201572, Volume 3 Issue 7, July 2014, 2224 - 2226

132 PDF Views | 117 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data integrity'

Views: 103 , Downloads: 83 | CTR: 81 % | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Views: 132 , Downloads: 100 | CTR: 76 % | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Views: 145 , Downloads: 102 | CTR: 70 % | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Views: 128 , Downloads: 103 | CTR: 80 % | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Views: 125 , Downloads: 104 | CTR: 83 % | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Similar Articles with Keyword 'Authentication'

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 139 , Downloads: 99 | CTR: 71 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Views: 154 , Downloads: 99 | CTR: 64 % | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 132 , Downloads: 99 | CTR: 75 % | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 119 , Downloads: 99 | CTR: 83 %

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Similar Articles with Keyword 'Message Digest'

Views: 138 , Downloads: 106 | CTR: 77 % | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Views: 132 , Downloads: 117 | CTR: 89 % | Weekly Hits: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2224 - 2226

Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt

Pradeep Singh Solanki, Vinit Agarwal

Share this Article

Views: 145 , Downloads: 120 | CTR: 83 % | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 632 - 634

Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm

Jissmol T Antony, Gopal B

Share this Article

Views: 144 , Downloads: 125 | CTR: 87 % | Weekly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1201 - 1208

An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks

Sindu.B, S. Sathya Priya

Share this Article

Views: 183 , Downloads: 125 | CTR: 68 % | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1579 - 1582

Enhancing Security and Speed of Sha-192 with Higher Avalanche

Sushama Ingale, Arun Jhapate

Share this Article

Similar Articles with Keyword 'Hashes'

Views: 132 , Downloads: 117 | CTR: 89 % | Weekly Hits: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2224 - 2226

Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt

Pradeep Singh Solanki, Vinit Agarwal

Share this Article

Views: 135 , Downloads: 117 | CTR: 87 % | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1683 - 1686

Review on Honey Encryption Technique

Nahri Syeda Noorunnisa, Dr. Khan Rahat Afreen

Share this Article
Top