CFP last date
20 January 2025
Reseach Article

Implementation and Comparative Analysis of RSA and MD5 Algorithm

by Saikat Das, Saugata De, Rahul Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 141 - Number 9
Year of Publication: 2016
Authors: Saikat Das, Saugata De, Rahul Kumar
10.5120/ijca2016909789

Saikat Das, Saugata De, Rahul Kumar . Implementation and Comparative Analysis of RSA and MD5 Algorithm. International Journal of Computer Applications. 141, 9 ( May 2016), 10-13. DOI=10.5120/ijca2016909789

@article{ 10.5120/ijca2016909789,
author = { Saikat Das, Saugata De, Rahul Kumar },
title = { Implementation and Comparative Analysis of RSA and MD5 Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 141 },
number = { 9 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume141/number9/24811-2016909789/ },
doi = { 10.5120/ijca2016909789 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:43:02.941930+05:30
%A Saikat Das
%A Saugata De
%A Rahul Kumar
%T Implementation and Comparative Analysis of RSA and MD5 Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 141
%N 9
%P 10-13
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we have made a comparative analysis of RSA Algorithm and a hash algorithm i.e., MD5 (Message Digest 5). Although the commonly used hash algorithms in the field of information security are MD5 and SHA-1 which evolved from MD4. We have implemented the logic of these algorithms in Java, and try to find something new and ended with the conclusion.

References
  1. Sattar J Aboud, “An Efficient method for Attack RSA Scheme,” Iraqi Council of Representatives, pp. 587-591, 2009
  2. Ming Hu, Yan Wang, “The Collision Rate Test of Two Known Message Digest Algorithms,” International Conference on Computational Intelligence and Security, pp. 319-323, 2009
  3. Hancheng LIAO, “Image Retrieval based on MD5,”International Conference on Advanced Computer Theory And Engineering, pp. 987-991, 2008
  4. Zhao Yong-Xia, Zhen Ge, “MD5 Research,” Second International Conference on Multimedia and Information Technology, pp. 271-273, 2010
  5. Keonwoo Kim, Un Sung Kyong, “Efficient Implementation of MD5 Algorithm in Password Recovery of a PDF File,” Cyber Convergence Security Division, ETRI, Daejon, Korea, pp. 1080-1083
  6. Anak Agung Putri Ratna, Ahmad Shaugi, Prima DewiPurnamasari, Muhammad Salman, “Analysis andComparison of MD5 and SHA-1 Algorithm Implementation in Simple –O Authentication Based Security System,” Universitas Indonesia, IEEE, pp. 99-104, 2013
  7. Xiaoling Wei, “MD5 Encryption Algorithm and Application,” Yan’an University Computing Center, 2010
  8. Quist-Aphetsi Kester, Lauret Nana, Anca Christine Pascu, Sophie Gire, “A New Encryption Cipher for Securing Digital Images of Video Surveillance Device using Diffle-Hellman-MD5 Algorithm and RGB pixel shuffling,”European Modelling Symposium, pp. 305-311, 2013
  9. Wang Xiayoun, “How to Break MD5 and other Hash Functions,” 2005
  10. Kasgar A.K., Agrawal Jitendra, Sahu Santosh, “New Modified 256-bit MD5 Algorithm with SHA Compression Function,” International Journal ofComputer Applications, pp. 47-51, 2012
  11. A. Sinha, K. Singh, “A technique for image encryption using digital signature,” Optics Communication”, pp. 229-234, 2003
  12. Kahate, Atul, 2003, “Cryptography and Network Security,” Tata McGraw-Hill, India
  13. William Stallings, “Cryptography and Netwok Security: Principles & Practice,” 5th EditionPrentice Hall; 5 edition (January 24, 2010)
  14. R. Rivest, “The MD5 Message-Digest Algorithm,” Network Working Group, 1992
  15. Zhengi Wang, Lisha Cao, “Implementation and Comparison of Two Hash Algorithms,” International Conference on Computational and Information Sciences, pp. 721-725, 2013
  16. X. Wang, D.Feng, X.Lai and H.Yu, “Collisions for Hash Functions,” in Crypto, 2004
  17. Bonteh S, “Twenty years of Attacks on the RSA Cryptosystem,” Notices of the American Mathematical Society, 46(2):203-213,1999
  18. Rashmi P.Sarode, Piyush Gupta, Neeraj Manglani, “A Comparative analysis of RSA and MD5 Algorithm,” Journal of Computer Science and Applications, pp. 25-33,2014
  19. Itoh, K., Kunihiro N.,KurosawaK., “Small secret key attack on a variant of RSA,”volume 4964 of Lecture Notes in Computer Science , pp. 387-406, 2008
  20. Shahzad Alam, Amir Jamil, Ankur Saldhi, Musheer Ahmad, “Digital Image Authentication and EncryptionUsing Digital Signature,” International Conference on Advances in Computer Engineering & Applications, pp. 332-336, 2015
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Hash Algorithm MD5 RSA.