Win a copy of The Little Book of Impediments (e-book only) this week in the Agile and Other Processes forum!
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

Dissertation topic on hash algorithm

 
anotida Maditsha
Greenhorn
Posts: 22
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator

Hi

i have my topic titled "implementation and evaluation of fast algorithms for one-way hashing functions".

this is my proposal dissertation topic and i would be grateful if you tell me any suggestions. i am a part 4 students and i want to do a successful dissertation with broad research.

i love algorithms that's why l choose this topic.
 
A.J. Côté
Ranch Hand
Posts: 417
Java
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Funny, we recently fooled around with hash functions in this thread:
http://www.coderanch.com/t/654653/java/java/remove-specific-object-ArrayList#3031407

Let us know more about your dissertation ;-)
 
anotida Maditsha
Greenhorn
Posts: 22
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
@ A. J. Cote. Thanks for the link. i am fascinated with the changing logistics between hashMaps and ArrayList to provide fast algorithm.

My question is it a good idea to look at the hashing algorithm? i read about increasing linkage of information, Corrupted documents over the internet and people bypassing emails etc. There is a lot of fraud occurring over the internet due to inefficient MD5 hashing algorithm for data transfer.

Can you suggest me reasons or this topic isn't really researchable.
 
A.J. Côté
Ranch Hand
Posts: 417
Java
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
anotida Maditsha wrote:@ A. J. Cote. Thanks for the link. i am fascinated with the changing logistics between hashMaps and ArrayList to provide fast algorithm.

My question is it a good idea to look at the hashing algorithm? i read about increasing linkage of information, Corrupted documents over the internet and people bypassing emails etc. There is a lot of fraud occurring over the internet due to inefficient MD5 hashing algorithm for data transfer.

Can you suggest me reasons or this topic isn't really researchable.


Well, in this case, I suggest you also look at PKI (Public key Infrastructure). You can sign files to make sure they aren't corrupted and you can also encrypt them without the need to share the secret key with the recipient.

Don't forget to pay credit to RSA (Rivest-Shamir-Adleman)

And yes, these concepts are taken for granted too often so, it might be worth and interesting to revisit them in your dissertation.
 
A.J. Côté
Ranch Hand
Posts: 417
Java
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
There is nothing wrong with md5 sums. It is just easier to crack a password or other data when equality is tested with an md5 hash. As computers get faster, you have to keep on raising the bar. I currently use sha-512 hashes for passwords and they are generated with a salt that changes every time a new password is generated.

The salt strategy is efficient against rainbow tables.
 
anotida Maditsha
Greenhorn
Posts: 22
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Thanks. The Public key Infrastructure l hadn't put major on this research. Your come out with a turn around broad idea.

i have something to get into.
 
A.J. Côté
Ranch Hand
Posts: 417
Java
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
anotida Maditsha wrote:Thanks. The Public key Infrastructure l hadn't put major on this research. Your come out with a turn around broad idea.

i have something to get into.


You are welcome!

Just let us know how the the adventure turns out please.
 
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic