This project studies the working principles and methods of the hash functions MD5 and BLAKE-256. MD5 hash function is not cryptographically secure now, it has already been broken and is used only for local integrity checks and other simple tasks, but it is a great example to understand the concept of hash functions. Here, MD5 hash functions i implemented to generate hash digests for any given strings. Also, DES block cipher was implemented alongside the two hash functions for an understanding of differential attacks later on. The repositories of codes are linked below.
- Implementation of MD5 hash function: Repository.
- Implementation of DES block cipher algorithm: Repository.
- Implementation of BLAKE-256 hash function: Repository.
- Implementation of BLAKE2s hash function: Repository.
- Dr Shashank Singh(IISER Bhopal)
- R. Rivest: The MD5 Message-Digest Algorithm (1992)
- Jean-Philippe Aumasson, Luca Henzen, Willi Meier, Raphael C.-W. Phan: Sha-3 proposal blake. Submission to NIST (2008)
- Joux, A. (2009). Algorithmic Cryptanalysis (1st ed.). Chapman and Hall/CRC. https://doi.org/10.1201/9781420070033