Vulnerabilities in cryptographic hash functions: A practical study of hash cracking techniques and security implications

https://doi.org/10.55214/25768484.v9i2.5072

Authors

This paper explores hash functions and their security challenges, which ensure data integrity and confidentiality in digital systems. With advancing computing power, particularly GPUs and distributed networks, hash functions face increasing threats from brute-force, dictionary, and rainbow table attacks. Tools like Hashcat, Cain & Abel, and John the Ripper were analyzed for their efficiency against MD5, SHA-1, and SHA-512. Results highlight vulnerabilities in standard algorithms, emphasizing the need for more robust hash functions, especially in high-security and resource-constrained environments.

Section

How to Cite

Redžepagić, . J. ., Regvart, D. ., Rudeš, H. ., & Petrunić, R. . (2025). Vulnerabilities in cryptographic hash functions: A practical study of hash cracking techniques and security implications. Edelweiss Applied Science and Technology, 9(2), 2307–2317. https://doi.org/10.55214/25768484.v9i2.5072

Downloads

Download data is not yet available.

Dimension Badge

Download

Downloads

Issue

Section

Articles

Published

2025-02-27