全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2017 

Merkle-Damg?rd Construction Method and Alternatives: A Review

DOI: 10.31341/jios.41.2.9

Keywords: Cryptographic hash function, Information security, Merkle-Damg?rd construction, MD5, SHA-1, Differential attacks

Full-Text   Cite this paper   Add to My Lib

Abstract:

Sa?etak Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damg?rd construction method with constant initialization vector. Merkle-Damg?rd construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damg?rd construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damg?rd construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133