Data Encryption - Hash Vulnerabilities

Article Index


Vulnerabilities in MD5 and SHA Hashes

As a final cautionary note, one would be remiss if they did not warn against insecurities in the SHA and MD5 hash schemas.  There are several tools out there that can greatly reduce the time and processing power required to perform a brute force attack against these keys.  Once the key is compromised, the data that it secures becomes completely insecure.  Several papers have been published and tools created demonstrating the vulnerabilities in these systems.  The better choice would be to use RIPEMD-160 or Whirlpool.