2019
DOI: 10.1007/s11277-019-06575-9
|View full text |Cite
|
Sign up to set email alerts
|

On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…In order to verify that information has not been tampered with in transit, the SHA-1 technique is used to generate a unique hash for each input. SHA-1 is widely used in IoT applications since it is fast and can generate a different hash for each input, and it is also significantly faster than its counterparts [188]. To verify that a message has not been tampered with, another technique called HMAC (Hash-based Message Authentication Code) is used, and it makes use of SHA-1.…”
Section: Sha-1mentioning
confidence: 99%
“…In order to verify that information has not been tampered with in transit, the SHA-1 technique is used to generate a unique hash for each input. SHA-1 is widely used in IoT applications since it is fast and can generate a different hash for each input, and it is also significantly faster than its counterparts [188]. To verify that a message has not been tampered with, another technique called HMAC (Hash-based Message Authentication Code) is used, and it makes use of SHA-1.…”
Section: Sha-1mentioning
confidence: 99%
“…Chu-Hsing Lin et al [1] conducted a study utilizing cloud computing and GPU parallel computing to find hash collisions in SHA-1, which is still widely used today. While SHA-1 is a popular hash function in the context of IoT, this research demonstrates the security vulnerabilities of SHA-1 and highlights the need for stronger hash functions.…”
Section: Introductionmentioning
confidence: 99%
“…Because of its larger output length, SHA-512 is suitable for scenarios that require higher security, such as cryptographic applications and digital certificates. 8 SHA-256 and SHA-512 have higher bit-width message digests and high security but also take up more area. 9,10 As the design of the algorithm is mainly used in data comparison rather than data encryption, there is no need for high security; after all aspects of the comparison, the SHA-1 algorithm is more suitable than the other two; it has the smallest bit width and the simplest logic and does not ARTICLE pubs.aip.org/aip/adv require additional design to defend against collision attacks; thus, in terms of performance, power consumption, and area, this algorithm is far ahead of the other two SHA algorithms.…”
Section: Introductionmentioning
confidence: 99%