EconPapers    
Economics at your fingertips  
 

Vulnerabilities in cryptographic hash functions: A practical study of hash cracking techniques and security implications

Jasmin Redžepagić (), Damir Regvart (), Hrvoje Rudeš () and Robert Petrunić ()

Edelweiss Applied Science and Technology, 2025, vol. 9, issue 2, 2307-2317

Abstract: This paper explores hash functions and their security challenges, which ensure data integrity and confidentiality in digital systems. With advancing computing power, particularly GPUs and distributed networks, hash functions face increasing threats from brute-force, dictionary, and rainbow table attacks. Tools like Hashcat, Cain & Abel, and John the Ripper were analyzed for their efficiency against MD5, SHA-1, and SHA-512. Results highlight vulnerabilities in standard algorithms, emphasizing the need for more robust hash functions, especially in high-security and resource-constrained environments.

Keywords: Brute-force attacks; Cybersecurity; Data integrity; Dictionary attacks; Hashes; Rainbow tables. (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://learning-gate.com/index.php/2576-8484/article/view/5072/1880 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ajp:edwast:v:9:y:2025:i:2:p:2307-2317:id:5072

Access Statistics for this article

More articles in Edelweiss Applied Science and Technology from Learning Gate
Bibliographic data for series maintained by Melissa Fernandes ().

 
Page updated 2025-03-19
Handle: RePEc:ajp:edwast:v:9:y:2025:i:2:p:2307-2317:id:5072