29 Aug 2022

139

The definition and results of hash collisions

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 293

Pages: 1

Downloads: 0

Due to the increased cybersecurity threats, message integrity has become a concern for technology researchers. One of the features that are used to protect message integrity is hashing. Hashing entails the process of assigning lengthy data a unique code that protects it from malicious users (Rasjid et al., 2017). However, hashing might experience a collision, where one hash is assigned to more than one value of data entered in a system. Hash collisions affect message integrity in several ways. In the event of hash collisions, an attacker can hack into a system by keying in a password that is close to the hashed data values. Therefore, message integrity is negatively affected by hash collisions because attackers can easily alter it. Similarly, when the hash collision occurs, attackers can easily access protected data and use it to accomplish illegal activities. Most fraud cases in the modern-day technological world result from a hash collision that grants attackers a chance to access confidential data and information. 

The algorithm Message Digest 5 (MD5) has been identified to harbor numerous weaknesses that make it possible for attackers to create multiple input sources similar to it. With Message Digest 5, attackers can come up with input values that have identical fingerprints. The counterfeit input values created by attackers are not prone to hash collision. According to Rasjid et al. (2017), cyber-attacks mostly rely on hash collisions resulting from the Message Digest 5. The Message Digest 5, therefore, is unreliable to encrypt data that is held confidential. Collisions related to the Message Digest 5 pose significant threats to message integrity and do not qualify to fight against cybersecurity. Hash collisions resulting from Message Direct 5 occur after data is encrypted for protection (Rasjid et al., 2017). After a hash collision has occurred, attackers create their unique input values that can be used to completely distort data integrity and deter the data owners from accessing it. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

References 

Rasjid, Z., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A Review of Collisions in Cryptographic Hash Function Used in Digital Forensic Tools. 116: 381-392. https://www.sciencedirect.com/science/article/pii/S1877050917321221 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). The definition and results of hash collisions.
https://studybounty.com/the-definition-and-results-of-hash-collisions-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 97

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 135

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration