Member-only story

Cryptographic hash functions & Attacks

Gaurav Kumar
6 min readSep 7, 2024

In this blog we will discuss on few popular algorithm used for securing the information and will touch on some of the popular attacks which makes this algorithm vulnerable. Here is the outline for the topic>

  • Introduction to Cryptographic Hash Functions
  • Importance of security in the digital world
  • Role of hash functions in maintaining data integrity
  • MD5: Overview and Weaknesses
  • What is MD5?
  • Its initial use and how it works
  • Vulnerabilities and obsolescence
  • SHA-1: Overview and Security Concerns
  • Introduction to SHA-1
  • Its design and purpose
  • Known attacks and why it’s no longer recommended
  • SHA-2: Improved Security and Variants
  • Evolution from SHA-1 to SHA-2
  • Different SHA-2 versions (SHA-224, SHA-256, SHA-384, SHA-512)
  • Use in modern security standards
  • SHA-3: A New Generation of Hashing
  • Why SHA-3 was developed
  • Differences from SHA-2
  • Use cases and security improvements
  • Birthday Attack: How Probability Can

--

--

Gaurav Kumar
Gaurav Kumar

No responses yet