Research Article

Implementation and Comparative Analysis of RSA and MD5 Algorithm

by  Saikat Das, Saugata De, Rahul Kumar
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 141 - Issue 9
Published: May 2016
Authors: Saikat Das, Saugata De, Rahul Kumar
10.5120/ijca2016909789
PDF

Saikat Das, Saugata De, Rahul Kumar . Implementation and Comparative Analysis of RSA and MD5 Algorithm. International Journal of Computer Applications. 141, 9 (May 2016), 10-13. DOI=10.5120/ijca2016909789

                        @article{ 10.5120/ijca2016909789,
                        author  = { Saikat Das,Saugata De,Rahul Kumar },
                        title   = { Implementation and Comparative Analysis of RSA and MD5 Algorithm },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 141 },
                        number  = { 9 },
                        pages   = { 10-13 },
                        doi     = { 10.5120/ijca2016909789 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Saikat Das
                        %A Saugata De
                        %A Rahul Kumar
                        %T Implementation and Comparative Analysis of RSA and MD5 Algorithm%T 
                        %J International Journal of Computer Applications
                        %V 141
                        %N 9
                        %P 10-13
                        %R 10.5120/ijca2016909789
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we have made a comparative analysis of RSA Algorithm and a hash algorithm i.e., MD5 (Message Digest 5). Although the commonly used hash algorithms in the field of information security are MD5 and SHA-1 which evolved from MD4. We have implemented the logic of these algorithms in Java, and try to find something new and ended with the conclusion.

References
  • Sattar J Aboud, “An Efficient method for Attack RSA Scheme,” Iraqi Council of Representatives, pp. 587-591, 2009
  • Ming Hu, Yan Wang, “The Collision Rate Test of Two Known Message Digest Algorithms,” International Conference on Computational Intelligence and Security, pp. 319-323, 2009
  • Hancheng LIAO, “Image Retrieval based on MD5,”International Conference on Advanced Computer Theory And Engineering, pp. 987-991, 2008
  • Zhao Yong-Xia, Zhen Ge, “MD5 Research,” Second International Conference on Multimedia and Information Technology, pp. 271-273, 2010
  • Keonwoo Kim, Un Sung Kyong, “Efficient Implementation of MD5 Algorithm in Password Recovery of a PDF File,” Cyber Convergence Security Division, ETRI, Daejon, Korea, pp. 1080-1083
  • Anak Agung Putri Ratna, Ahmad Shaugi, Prima DewiPurnamasari, Muhammad Salman, “Analysis andComparison of MD5 and SHA-1 Algorithm Implementation in Simple –O Authentication Based Security System,” Universitas Indonesia, IEEE, pp. 99-104, 2013
  • Xiaoling Wei, “MD5 Encryption Algorithm and Application,” Yan’an University Computing Center, 2010
  • Quist-Aphetsi Kester, Lauret Nana, Anca Christine Pascu, Sophie Gire, “A New Encryption Cipher for Securing Digital Images of Video Surveillance Device using Diffle-Hellman-MD5 Algorithm and RGB pixel shuffling,”European Modelling Symposium, pp. 305-311, 2013
  • Wang Xiayoun, “How to Break MD5 and other Hash Functions,” 2005
  • Kasgar A.K., Agrawal Jitendra, Sahu Santosh, “New Modified 256-bit MD5 Algorithm with SHA Compression Function,” International Journal ofComputer Applications, pp. 47-51, 2012
  • A. Sinha, K. Singh, “A technique for image encryption using digital signature,” Optics Communication”, pp. 229-234, 2003
  • Kahate, Atul, 2003, “Cryptography and Network Security,” Tata McGraw-Hill, India
  • William Stallings, “Cryptography and Netwok Security: Principles & Practice,” 5th EditionPrentice Hall; 5 edition (January 24, 2010)
  • R. Rivest, “The MD5 Message-Digest Algorithm,” Network Working Group, 1992
  • Zhengi Wang, Lisha Cao, “Implementation and Comparison of Two Hash Algorithms,” International Conference on Computational and Information Sciences, pp. 721-725, 2013
  • X. Wang, D.Feng, X.Lai and H.Yu, “Collisions for Hash Functions,” in Crypto, 2004
  • Bonteh S, “Twenty years of Attacks on the RSA Cryptosystem,” Notices of the American Mathematical Society, 46(2):203-213,1999
  • Rashmi P.Sarode, Piyush Gupta, Neeraj Manglani, “A Comparative analysis of RSA and MD5 Algorithm,” Journal of Computer Science and Applications, pp. 25-33,2014
  • Itoh, K., Kunihiro N.,KurosawaK., “Small secret key attack on a variant of RSA,”volume 4964 of Lecture Notes in Computer Science , pp. 387-406, 2008
  • Shahzad Alam, Amir Jamil, Ankur Saldhi, Musheer Ahmad, “Digital Image Authentication and EncryptionUsing Digital Signature,” International Conference on Advances in Computer Engineering & Applications, pp. 332-336, 2015
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cryptography Hash Algorithm MD5 RSA.

Powered by PhDFocusTM