This paper explores hash functions and their security challenges, which ensure data integrity and confidentiality in digital systems. With advancing computing power, particularly GPUs and distributed networks, hash functions face increasing threats from brute-force, dictionary, and rainbow table attacks. Tools like Hashcat, Cain & Abel, and John the Ripper were analyzed for their efficiency against MD5, SHA-1, and SHA-512. Results highlight vulnerabilities in standard algorithms, emphasizing the need for more robust hash functions, especially in high-security and resource-constrained environments.
Section
How to Cite
Redžepagić, . J. ., Regvart, D. ., Rudeš, H. ., & Petrunić, R. . (2025). Vulnerabilities in cryptographic hash functions: A practical study of hash cracking techniques and security implications. Edelweiss Applied Science and Technology, 9(2), 2307–2317. https://doi.org/10.55214/25768484.v9i2.5072
Downloads
Download data is not yet available.
Dimension Badge
Issue
Section
Articles
Published
2025-02-27