Vulnerabilities in cryptographic hash functions: A practical study of hash cracking techniques and security implications
Jasmin Redžepagić (),
Damir Regvart (),
Hrvoje Rudeš () and
Robert Petrunić ()
Edelweiss Applied Science and Technology, 2025, vol. 9, issue 2, 2307-2317
Abstract:
This paper explores hash functions and their security challenges, which ensure data integrity and confidentiality in digital systems. With advancing computing power, particularly GPUs and distributed networks, hash functions face increasing threats from brute-force, dictionary, and rainbow table attacks. Tools like Hashcat, Cain & Abel, and John the Ripper were analyzed for their efficiency against MD5, SHA-1, and SHA-512. Results highlight vulnerabilities in standard algorithms, emphasizing the need for more robust hash functions, especially in high-security and resource-constrained environments.
Keywords: Brute-force attacks; Cybersecurity; Data integrity; Dictionary attacks; Hashes; Rainbow tables. (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://learning-gate.com/index.php/2576-8484/article/view/5072/1880 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ajp:edwast:v:9:y:2025:i:2:p:2307-2317:id:5072
Access Statistics for this article
More articles in Edelweiss Applied Science and Technology from Learning Gate
Bibliographic data for series maintained by Melissa Fernandes ().