วันจันทร์ที่ 22 เมษายน พ.ศ. 2567

Widely used hashing algorithm

The most commonly used hashing algorithm is SHA-256 (Secure Hash Algorithm 256). It is widely used for cryptographic security and data integrity verification in various applications, including digital signatures, SSL/TLS certificates, and blockchain technology.

Vulnerabilities of MD5 (hash value is 128 bits) 

1. Collision Vulnerabilities: MD5 is susceptible to collision attacks, where two different inputs produce the same hash. This poses a severe security risk, particularly in applications like digital signatures.

2. Preimage Attacks: Attackers can reverse-engineer the hash to find an input that matches a given MD5 hash, compromising data security.

3. Speed: The speed at which MD5 can generate hashes makes it susceptible to brute force attacks.

cf. https://medium.com/@techclaw/exploring-the-power-and-vulnerabilities-of-the-md5-algorithm-feb249ef9dfb#:~:text=MD5%20is%20susceptible%20to%20collision,in%20applications%20like%20digital%20signatures.