Design and Implementation of a Fast Algorithm for File Integrity Verification

Article Preview

Abstract:

At present, MD5 algorithm is commonly used in the file transfer system to conduct the tests of file integrity, but when a file is too large, it will take a long time to generate MD5 code for the whole file, with the result of reducing the transmission efficiency of the file. Based on this conduction, a fast algorithm of file integrity detection is provided, which can generate MD5 code with the file size and some random content of the file. Although the algorithm cannot test files roundly, it is integrated into the file transfer system. The test results show that this algorithm can detect the file integrity faster, and when the file is damaged or tampered with, the probability of detecting changes of the file content is higher than the theoretical value. The algorithm has great value in engineering applications.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

918-922

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] ZHENG Guangming, HU Bo. The design of file integrity checking system based on MD5[J]. Journal of Hunan Institute of Science and Technology (Natural sciences), 2007, 20(1): 35-64 (In Chinese).

Google Scholar

[2] Danyang Cao, Bingru Yang. Design and implementation for MD5-based data integrity checking system[J]. Information Management and Engineering, 2010: 608-611.

DOI: 10.1109/icime.2010.5477912

Google Scholar

[3] Keonwoo Kim, Un Sung Kyong. Efficient implementation of MD5 algorithm in password recovery of a PDF file[J]. Computing and Convergence Technology, 2012: 1080-1083.

Google Scholar

[4] Xiaoling Zheng, Jidong Jin. Research for the application and safety of MD5 algorithm in password authentication[J]. Fuzzy Systems and Knowledge Discovery, 2012: 2216-2219.

DOI: 10.1109/fskd.2012.6234010

Google Scholar

[5] WANG Nana. Trying to use MD5 algorithm to detect file integrity[J]. Journal of ShanXi Finance Economics University, 2007, 29(2): 209-210(In Chinese).

Google Scholar

[6] ZHANG Lixiang. Design and implementation of MD5 with salt[J]. SOFTWARE, 2013, 34(3): 84-85(in Chinese).

Google Scholar

[7] MAO Yi, CHEN Na. Research and improvement of MD5 algorithm[J]. Computer Engineering, 2012 , 38(24): 111-118(In Chinese).

Google Scholar

[8] HAN Jinsheng, LIN Jiajun, YE Jianwu, ZHOU Wenjin. Design of MD5 high-speed models on FPGA[J]. Transactions of Beijing Institute of Technology, 2012, 32(12): 1258-1268(In Chinese).

Google Scholar

[9] WANG Jintao, QIN Shangyi, WANG Dongmei. Iterative redundant encryption based on MD5 algorithm[J]. Computer Engineering and Design, 2007, 28(1): 41-111(In Chinese).

Google Scholar

[10] LIU Yuanchun. The application of MD5 algorithm in TV program technique quality control system[J]. CHINA DIGITAL CABLE TV, 2010, (10): 1146-1149(In Chinese).

Google Scholar