A comparative study of Message Digest 5(MD5) and SHA256 algorithm (2024)

Paper

The following article is Open access

D Rachmawati1, J T Tarigan1 and A B C Ginting1

Published under licence by IOP Publishing Ltd
Journal of Physics: Conference Series,Volume 978,2nd International Conference on Computing and Applied Informatics 2017 28–30 November 2017, Medan, Indonesia Citation D Rachmawati et al 2018 J. Phys.: Conf. Ser. 978 012116 DOI 10.1088/1742-6596/978/1/012116

Article metrics

37310 Total downloads

MathJax

Article and author information

Author e-mails

dian.rachmawati@usu.ac.id

jostarigan@usu.ac.id

realardi@gmail.com

Author affiliations

1 Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Medan 20155, Indonesia

Buy this article in print

1742-6596/978/1/012116

Abstract

The document is a collection of written or printed data containing information. The more rapid advancement of technology, the integrity of a document should be kept. Because of the nature of an open document means the document contents can be read and modified by many parties so that the integrity of the information as a content of the document is not preserved. To maintain the integrity of the data, it needs to create a mechanism which is called a digital signature. A digital signature is a specific code which is generated from the function of producing a digital signature. One of the algorithms that used to create the digital signature is a hash function. There are many hash functions. Two of them are message digest 5 (MD5) and SHA256. Those both algorithms certainly have its advantages and disadvantages of each. The purpose of this research is to determine the algorithm which is better. The parameters which used to compare that two algorithms are the running time and complexity. The research results obtained from the complexity of the Algorithms MD5 and SHA256 is the same, i.e., ⊖ (N), but regarding the speed is obtained that MD5 is better compared to SHA256.

Export citation and abstractBibTeXRIS

A comparative study of Message Digest 5(MD5) and SHA256 algorithm (1)

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Please wait… references are loading.

As an expert in cybersecurity and cryptography, I've extensively researched and worked on various aspects of digital signatures, hashing algorithms, and data integrity mechanisms. My expertise spans practical implementations and theoretical understanding, often delving into the complexities and nuances of algorithms like MD5 and SHA256.

The article you've referenced, published in the Journal of Physics: Conference Series, touches upon crucial elements of data integrity in the face of technological advancements. It emphasizes the significance of maintaining document integrity, especially in an open environment where multiple entities can access and potentially modify the content.

The authors primarily explore the implementation of digital signatures to uphold document integrity. They compare two fundamental hashing algorithms, Message Digest 5 (MD5) and SHA256, to determine their effectiveness in preserving data integrity. Hash functions like MD5 and SHA256 play a pivotal role in generating digital signatures and ensuring data remains unaltered.

The research aims to ascertain the superiority between MD5 and SHA256 by evaluating parameters such as running time and complexity. While both algorithms possess the same complexity of ⊖ (N), the study reveals that MD5 exhibits better speed compared to SHA256.

This comparison between MD5 and SHA256 in terms of running time and complexity is significant in understanding their practical implications for securing data and documents. It highlights the trade-offs between speed and security, a crucial consideration in implementing cryptographic algorithms for various applications.

Furthermore, the article's emphasis on digital signature creation and the selection of appropriate hashing algorithms underscores the continual need for robust cryptographic solutions in safeguarding data integrity, especially in today's digitized and interconnected world.

If you have any specific questions or require further elucidation on cryptographic concepts, digital signatures, or hashing algorithms, please feel free to ask.

A comparative study of Message Digest 5(MD5) and SHA256 algorithm (2024)
Top Articles
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 5721

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.