Design and Implementation of Efficient Hash Functions

Han Zhuoyu,Li Yongzhen
DOI: https://doi.org/10.1109/icpeca53709.2022.9719176
2022-01-01
Abstract:With the rapid popularity of the network, the development of information encryption technology has a significant role and significance in securing network security. The security of information has become an issue of concern to the whole society, and the study of cryptography has been increasingly concerned, and the hash function is the core of modern cryptography, the most common hash algorithms are MD5 series of algorithms, SHA series of algorithms. MD5 is a popular and excellent typical Hash encryption technology today, which is used for password management, electronic signature, spam screening. In this paper, we focus on the improved MD5 algorithm with more efficiency, focusing on the internal structure of MD5, and finally making it more efficient in retrieval.
What problem does this paper attempt to address?