Research Article

From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone

Table 5

The collision thresholds for four commonly used hash functions.

Hash functionFunction collision threshold

MD5
SHA-1
SHA-256