M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014
Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt
Pradeep Singh Solanki, Vinit Agarwal
Hashing based algorithms are the most commonly used method to strain passwords into hashes which are theoretically non decipherable. This paper proposes a new method and analyses of implementing one more tier to the message digest 5 algorithm using an enhancement of IDEA algorithm, a potential salt by the developer and an basic method to peruse a new root method to set the pattern for two roots as salt into the message digest 5 algorithm.
Keywords: Data integrity, Authentication, Message Digest, Hashes
Edition: Volume 3 Issue 7, July 2014
Pages: 2224 - 2226
How to Cite this Article?
Pradeep Singh Solanki, Vinit Agarwal, "Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201572, Volume 3 Issue 7, July 2014, 2224 - 2226
100 PDF Views | 86 PDF Downloads
Similar Articles with Keyword 'Data integrity'
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1251 - 1256IT Auditing and its Standards
Dr D S Kushwaha, Ankur Singh
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2619 - 2622Information Security in Multi-Cloud Environment
Digambar D. Patil, Megha Singh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2098 - 2102Public Auditing System with Auto-Data Recovery System on Cloud Scheme
Dhane Sachin V., Joshi P.
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Similar Articles with Keyword 'Authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1724 - 1727Privacy Preserving Authenticity Framework for Shared Data Cloud Network
P. Vanitha Sree, K. Narayana Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Similar Articles with Keyword 'Message Digest'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 2224 - 2226Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt
Pradeep Singh Solanki, Vinit Agarwal
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 478 - 482Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019
Pages: 1579 - 1582Enhancing Security and Speed of Sha-192 with Higher Avalanche
Sushama Ingale, Arun Jhapate
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 632 - 634Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm
Jissmol T Antony, Gopal B
Similar Articles with Keyword 'Hashes'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 2224 - 2226Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt
Pradeep Singh Solanki, Vinit Agarwal
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 1683 - 1686Review on Honey Encryption Technique
Nahri Syeda Noorunnisa, Dr. Khan Rahat Afreen