PRACTICAL APPLICATIONS OF HASH FUNCTIONS MD5, SHA-1, AND SHA-256 USING VARIOUS SOFTWARE TOOLS TO VERIFY THE INTEGRITY OF FILES

PRACTICAL APPLICATIONS OF HASH FUNCTIONS MD5, SHA-1, AND SHA-256 USING VARIOUS SOFTWARE TOOLS TO VERIFY THE INTEGRITY OF FILES

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

DOI:

https://doi.org/10.46687/jsar.v27i1.413

Keywords:

Algorithms, Calculation, CrypTool, Hash, HashCalc, Integrity, MD5, MD5 Calculator, Privacy, Security, SHA-1, SHA-256, 7z

Abstract

In this scientific paper hash functions such as MD5, SHA-1, and SHA-256 are widely utilized in the field of cryptography to verify file integrity, confirming that files remain unaltered and free from corruption. The practical application of the hash functions MD5, SHA-1, AND SHA-256 through five widely used software tools: 7z, PowerShell, BullZip MD5 Calculator, HashCalc and CrypTool 1.4.40 is made. The analysis focuses on each tool's effectiveness in calculating and comparing hash values, emphasizing their strengths and weaknesses in ensuring data integrity. By investigating the functionality and applications of each tool, this scientific study provides important perspectives on the practical significance of MD5, SHA-1, and SHA-256 for maintaining the authenticity and reliability of digital files.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria, e-mail: petar.boyanov@shu.bg, ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Abu-El Humos, A., Alhalabi, B., Hamzal, M. K., Shufro, E., & Awada, W. (2005, November). Remote labs environments (RLE): A constructivist online experimentation in science, engineering, and information technology. In 31st Annual Conference of IEEE Industrial Electronics Society, 2005. IECON 2005. (pp. 6-pp). IEEE.

A. Z. Mahfud, M. T. Sabila, N. A. Wibowo, A. Rhamdhan and D. F. Priambodo, "A Systematic Literature Review on Operating System Security: Distribution and Issues," 2023 3rd International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS), Yogyakarta, Indonesia, 2023, pp. 70-75, https://doi:10.1109/ICE3IS59323.

10335475, https://ieeexplore.ieee.org/abstract/document/10335475.

Bedzhev, B., Trıfonov, T., & Nıkolov, N. (2010). A multicore computer system for design of stream ciphers based on random feedback shift registers. İstanbul Aydın Üniversitesi Dergisi, Turkey, 2(7), 1-15., https://dergipark.org.tr/en/download/article-file/319309. [Last accessed on 25 September 2024]

Boyanov, P., Using modified sniffer scripts, implementing linear algorithms for detection of network port scan attacks in Linux based operating systems. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 24, Shumen, 2023, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 78-88.

Boyanov, P., Investigating the network traffic using the command-line packets sniffer Tcpdump in Kali Linux. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 25, Shumen, 2023, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 31-44, doi: https://doi.org/10.46687/jsar.v25i1.378.

Chaudhary, S., Amgai, R., Gupta, S. D., Iftekhar, N., Zafar, S., & Mahto, A. K. (2022). Comparative Study of Static and Hybrid Analysis Using Machine Learning and Artificial Intelligence in Smart Cities. In IoT for Sustainable Smart Cities and Society (pp. 195-226). Cham: Springer International Publishing.

Dehghantanha, A., & Dargahi, T. (2017). Residual Cloud Forensics: CloudMe and 360Yunpan as case studies. In Contemporary Digital Forensic Investigations of Cloud and Mobile Applications (pp. 247-283). Syngress.

Esslinger, B. (2008). CrypTool. Available via www.cryptool.de. [Last accessed on 19 September 2024]

Esslinger, B. (2024). Learning and Experiencing Cryptography with CrypTool and SageMath. Artech House, ISBN: 978-1-68569-017-5.

Gueorguiev N.L., Nesterov K.N., Minev S., An approach to information exchange management in multimodule multi-position security systems. International Scientific Journal "Security & Future", Vol. 6, Issue 1, pp: 28-31, STUME, 2022, WEB ISSN 2535-082X; PRINT ISSN 2535-0668, https://stumejournals.com/journals/confsec/2022/1/28.full.pdf.

Hick, S., Esslinger, B., & Wacker, A. (2012). Reducing the complexity of understanding cryptology using CrypTool. In 10th International Conference on Education and Information Systems, Technologies and Applications (EISTA 2012), Orlando, Florida, USA.

Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, ISBN 978-3-030-65721-5, Springer 2020, pp.13-24,https://doi.org/10.1007/

-3-030-65722-2.

Iliev, R., Kochankov, M., A Generalized Net Model of Command and Control System. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 127-131, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8035.

Ivanov, I., & Aleksandrova, K. (2024, June). Design and Implementation of Software-Defined Doppler Radar. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume III, pp. 105-108, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol3.8159.

Kao, C. N., Si, S., Huang, N. F., Liao, I. J., Liu, R. T., & Hung, H. W. (2015, April). Fast proxyless stream-based anti-virus for Network Function Virtualization. In Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) (pp. 1-5). IEEE.

Kawala, J. (2023). Encrypto: Technical Report (Doctoral dissertation, Dublin, National College of Ireland).

Kochankov, M., & Iliev, R. (2024, June). A Generalized Net Model for Accessing Information Resources in a Secure Environment. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 175-178, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.

/etr2024vol2.8034.

Kolev, Al., Nikolova, P., Instrumental Equipment for Cyberattack Prevention. Information & Security: An International Journal 47, no. 3 (2020):285-299. https://doi.org/10.11610/isij.4720.

Kopal, N. (2018, June). Solving Classical Ciphers with CrypTool 2. In HistoCrypt (pp. 149-010).

Kopal, N., & Esslinger, B. (2022, June). New Ciphers and Cryptanalysis Components in CrypTool 2. In International Conference on Historical Cryptology (pp. 127-136).

Li, S., Zhang, K., Zhang, R., Zhu, M., Luo, H., & Wu, S. (2021, July). Random Parameter Normalization Technique for Mimic Defense Based on Multi-queue Architecture. In International Conference on Artificial Intelligence and Security (pp. 321-331). Cham: Springer International Publishing.

Lieber, P. A. (2011). FPG Communication Framework for Communication, Debugging, Testing, and Rapid Prototyping (Master's thesis, Brigham Young University).

Llovet Ureña, M. (2015). Network layer security and secret key authentication (Bachelor's thesis, Universitat Politècnica de Catalunya).

Maeref, M., & Algali, F. (2015, January). An empirical evaluation of Cryptool in teaching computer security. In Proceedings of the International Conference on Computer Science, Engineering and Applications (pp. 93-100).

Mirtcheva-Ivanova, Daniela, Application of electronic platforms to increase the knowledge of learners. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 448-452, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8090.

Mirtcheva-Ivanova, D., Application of Artificial Intelligence in E-Learning. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 208-211, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8053.

Moreb, M. (2022). Impact of Device Jailbreaking or Rooting on User Data Integrity in Mobile Forensics. In Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices (pp. 227-258). Berkeley, CA: Apress.

Nurdin, A. A., & Djuniadi, D. (2022). Securing audio chat with cryptool-based twofish algorithm. Journal of Soft Computing Exploration, 3(1), 37-43.

Onete, C. (2008). Visualisation of Modern Key Exchange Schemes for more than two Parties in CrypTool and their Security Analysis.

Pavlov, G., Kolev. Al., A place of GIS technologies in information Systems for crisis prevention, 6th International Conference on Application of Information and Communication Technology and Statistics In Economy and Education (ICAICTSEE – 2016), December 2-3rd, 2016, UNWE, Sofia, Bulgaria, ISSN 2367-7635 (print), ISSN 2367-7643 (online), pp. 452-457.

Qureshi, M. A., Ahmed, S., Mehmood, A., Shaheen, R., & Dildar, M. S. (2024). Vulnerability assessment of operating systems in healthcare: exploitation implications techniques and security. Health Sciences Journal, 2(2), 104-111, ISSN (Online): 2959-2259, ISSN (Print): 2959-2240, https://doi.org/10.59365/hsj.2(2).2024.98.

Salmi, G. N., & Siagian, F. (2022). Implementation of the data encryption using caesar cipher and vernam cipher methods based on CrypTool2. Journal of Soft Computing Exploration, 3(2), 99-104.

Sobieraj, S. C. (2008). Mobile device forensics case file integrity verification. Master of Science thesis, Purdue University, West Lafayette, Indiana.

Sudyana, D., Putra, R. T., & Soni, S. (2019). Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037: 2014. Sinkron: jurnal dan penelitian teknik informatika, 3(2), 67-72.

Suhaili, S., Julai, N., Sapawi, R., & Rajaee, N. (2024). Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design. Pertanika Journal of Science & Technology, 32(1).

Tuli R. Analyzing Network performance parameters using wireshark. arXiv preprint arXiv:2302.03267, 2023 Feb 7, International Journal of Network Security & Its Applications (IJNSA), 2023.

Trifonov T., 2019, Modeling and Calculation of Passive Audio Crossovers, Annual of Konstantin Preslavsky University of Shumen, Vol IX E Technical Sciences, ISSN 1311-834X, pp. 182-189.

Trifonov, T., Performance analysis of a mobile computer equipped with solid state disk. Annual of Konstantin Preslavsky University of Shumen, Shumen, Konstantin Preslavsky University Press, ISSN 1311-834X, Vol. IV E, 2014, pp. 27–42.

Downloads

Published

13.11.2024

How to Cite

Boyanov, P. (2024). PRACTICAL APPLICATIONS OF HASH FUNCTIONS MD5, SHA-1, AND SHA-256 USING VARIOUS SOFTWARE TOOLS TO VERIFY THE INTEGRITY OF FILES: PRACTICAL APPLICATIONS OF HASH FUNCTIONS MD5, SHA-1, AND SHA-256 USING VARIOUS SOFTWARE TOOLS TO VERIFY THE INTEGRITY OF FILES. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 27(1), 120–137. https://doi.org/10.46687/jsar.v27i1.413

Issue

Section

Communication and computer technologies

Categories