EconPapers    
Economics at your fingertips  
 

Performance and Security Tradeoffs in Cryptographic Hash Functions

Sultan Almuhammadi and Omar Mohammed Bawazeer
Additional contact information
Sultan Almuhammadi: King Fahd University of Petroleum and Minerals, Saudi Arabia
Omar Mohammed Bawazeer: King Fahd University of Petroleum and Minerals, Saudi Arabia

International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 2020, vol. 12, issue 4, 37-51

Abstract: A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoffs between performance and security of cryptographic hash functions on mobile devices due to their limited computational power. The researchers in this paper study the most common cryptographic hash functions and highlights the tradeoffs between their performance and security. The hash functions considered in this study are MD4, MD5, Whirlpool, and the hash functions in the SHA family. The security of these hash functions is compared based on recent attacks in terms of collision resistance, preimage attacks, and sensitivity analysis. While the performance is tested on different input block sizes, useful observations and recommendations are made based on the results of this study.

Date: 2020
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJITN.2020100103 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jitn00:v:12:y:2020:i:4:p:37-51

Access Statistics for this article

International Journal of Interdisciplinary Telecommunications and Networking (IJITN) is currently edited by Efosa Carroll Idemudia

More articles in International Journal of Interdisciplinary Telecommunications and Networking (IJITN) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jitn00:v:12:y:2020:i:4:p:37-51