Title | Design and implementation of efficient hash functions |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Zhuoyu, Han, Yongzhen, Li |
Conference Name | 2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA) |
Keywords | compositionality, Computer applications, Conferences, Focusing, hash algorithms, Hash Function, Hash functions, MD5, Network security, passwords, power electronics, pubcrawl, resilience, Resiliency |
Abstract | With the rapid popularity of the network, the development of information encryption technology has a significant role and significance in securing network security. The security of information has become an issue of concern to the whole society, and the study of cryptography has been increasingly concerned, and the hash function is the core of modern cryptography, the most common hash algorithms are MD5 series of algorithms, SHA series of algorithms. MD5 is a popular and excellent typical Hash encryption technology today, which is used for password management, electronic signature, spam screening. In this paper, we focus on the improved MD5 algorithm with more efficiency, focusing on the internal structure of MD5, and finally making it more efficient in retrieval. |
DOI | 10.1109/ICPECA53709.2022.9719176 |
Citation Key | zhuoyu_design_2022 |