UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 10 | October 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 2
February-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2402024


Registration ID:
532360

Page Number

a195-a198

Share This Article


Jetir RMS

Title

Comprehensive Review of the Security Flaws of Hashing Algorithms

Abstract

Blockchain, an emerging technology, relies heavily on the efficiency and performance of hash functions. Originally developed to meet specific cryptographic needs, these functions have now become commonplace for developers and protocol programmers. Since 2004, however, attacks on conventional hash algorithms have increased dramatically. In this paper, we scrutinize the reported security flaws in well-known hashing algorithms and identify those that are easily exploited. A hash function is considered broken when an attack can use specific performance information to find a preimage, second preimage, or collision faster than a normal attack Our analysis delves into the changing landscape of cryptographic vulnerabilities, highlighting the sharp rise in post-2004 attacks. By analyzing reported security flaws we categorize and analyze attacks, providing a nuanced understanding of weaknesses in different hashing algorithms Furthermore, we provide a comprehensive summary of a it deals with hash algorithms that have been compromised, providing a valuable resource for blockchain developers This collection not only supports blockchain selection, design, and implementation but also forms the basis for future research to increase the security of hash implementation in the context of blockchain and other emerging technologies .

Key Words

Hashing Algorithms, Security Flaws, ,Cryptography, MD5, Hash Function Attacks, SHA-256.

Cite This Article

"Comprehensive Review of the Security Flaws of Hashing Algorithms", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 2, page no.a195-a198, February-2024, Available :http://www.jetir.org/papers/JETIR2402024.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Comprehensive Review of the Security Flaws of Hashing Algorithms", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 2, page no. ppa195-a198, February-2024, Available at : http://www.jetir.org/papers/JETIR2402024.pdf

Publication Details

Published Paper ID: JETIR2402024
Registration ID: 532360
Published In: Volume 11 | Issue 2 | Year February-2024
DOI (Digital Object Identifier):
Page No: a195-a198
Country: Mumbai, Maharashtra, India .
Area: Science
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000308

Print This Page

Current Call For Paper

Jetir RMS