International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 104 - Number 14 |
Year of Publication: 2014 |
Authors: Surbhi Aggarwal, Neha Goyal, Kirti Aggarwal |
10.5120/18267-9305 |
Surbhi Aggarwal, Neha Goyal, Kirti Aggarwal . A Review of Comparative Study of MD5 and SHA Security Algorithm. International Journal of Computer Applications. 104, 14 ( October 2014), 1-4. DOI=10.5120/18267-9305
Security algorithms or cryptography enables secure communication between two parties in the presence of a third-party or an eavesdropper. It assures the recipient of the message of the authenticity of the claimed source, protects the message against the unauthorized release of the message content by the adversaries, limits the access to authorized users, protects against sender/receiver denying sending/receiving a message. MD5 and Security Hash algorithms (SHA), cryptographic hash algorithms are one-way hashing functions which are easier to compute but are much harder to reverse and would take around millions of years to compute the authentic or veritable message content. This research paper aims to analyze and juxtapose the two hash algorithms, MD5 and SHA, using various key features and performance metrics. Their features have also been highlighted in order to provide the researchers a better comparison picture so that they can reach to the final upshot, which algorithm has superseded the other.