Research and Improvement of Computing Algorithms for Calculating the Trigonometrical Coefficients of the Hashing Algorithm MD5

2024;
: pp. 26 - 35
1
Lviv Polytechnic National University, Ukraine
2
Lviv Polytechnic National University, Ukraine
3
Lviv Polytechnic National University, Ukraine,Department of Information Technology Security

The paper examines the problems of ensuring the authenticity of messages, as well as analyzes the modern requirements for hash functions and the problems of designing algorithms for calculating hash functions.

The common MD5 hashing algorithm was investigated. These days, its level of security is considered insufficient for protecting high-level data confidentiality. However, it is an effective and fast algorithm for hashing messages and is successfully used to protect commercial information. The paper examines the main computational transformations of the MD5 hashing algorithm. It is shown that variable constants are used in the MD5 algorithm to improve stability. A sweep of the sine function is used to calculate these variable constants.

The paper examines the feasibility of using number-pulse computing structures for the calculation of variable trigonometric constants of the MD5 hashing algorithm. It is shown that the use of classical number-pulse computing structures is impractical due to the insufficient range of reproduction of the necessary trigonometric functions. Advanced wide-band digital-pulse structures provide the necessary conversion function, range and accuracy. However, the speed of such calculators is critically insufficient to calculate all the trigonometric coefficients of the MD5 hashing algorithm.

The paper developed a mathematical and software model of the structure of the sine function expansion for the MD5 algorithm. The mathematical model is based on the relations for the sine and cosine of the sum of the arguments, which are adapted for the MD5 hashing algorithm. The use of the developed differential computing structure allows saving memory when implementing the algorithm on devices with limited memory resources.

  1. Rivest R. The MD5 Message-Digest Algorithm. Technical Report Internet. RFC-1321, IETF, 1992. Available at: https://www.ietf.org/rfc/rfc1321.txt (Accessed: 26 February 2024).
  2. Schneier B. One-Way Hash Functions, Dr. Dobb’s fournal, vol. 16, No. 9, Sep. 1991, pp. 148–151. Available at:https://doi.org/10.1002/9781119183471.ch18 (Accessed: 26 February 2024).
  3. Schneier B. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, New York, second edition, 1998, DOI:10.1002/9781119183471.
  4. Gorpeniuk A. Fast algorithms and computing means of cryptological functions, International Scientific Journal of Computing. October 2005, Vol. 4, Issue 2, pp. 69–76. DOI: https://doi.org/10.47839/ijc.4.2.339.
  5. Horpenyuk A., Dudykevych V., Luzhetska N. (2009). Conveyor sine-cosine pulse- number functional converter, Automation, measurement and control, Lviv Polytechics, Num.639, pp.94-101. (in Ukrainian). Available at: https://vlp.com.ua/files/13_4.pdf (Accessed: 26 February 2024).
  6. Yang Y., Bi J., Chen X., Yuan Z., Zhou Y. and Shi W. (2018). Simple hash function using discrete-time quantum walks. Quantum Information Processing. 17:8. (1–19). Online publication date: 1-Aug-2018. Available at: https://doi.org/10.1007/s11128-018-1954-2 (Accessed: 26 February 2024).
  7. Faragallah O. (2018). Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption. Wireless Personal Communications: An International Journal. 98:2. (2009–2023). Online publication date: 1-Jan-2018. Available at: https://doi.org/10.1007/s11277-017-4960-2 (Accessed: 26 February 2024).