Merkle-Damgård Construction Method and Alternatives: A Review
Journal Title: Journal of Information and Organizational Sciences - Year 2017, Vol 41, Issue 2
Abstract
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Damgård construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgård construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgård construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.
Authors and Affiliations
Harshvardhan Tiwari
From the Editor
Dear readers and authors, It is the last time I am addressing you as the editor of the Journal. From the next issue the job of the editor will be taken over by Dr. Dijana Oreški. I am sure that the new editor will bring...
Utilization of Discrete Event Simulation in Business Processes Management Projects: a Literature Review
Discrete event simulation (DES) software is often used in business process management (BPM) projects, in order to support modeling, change and automatization of process modeling. However, the current research lacks syste...
Key Factors of an Organization’s Environment for the Acquisition and Assimilation of an Innovation
The paper deals with influential factors of an organization’s environment in the initial phase of diffusion of innovations (DOI) within the organization. A qualitative research was carried out with two expert groups: one...
Learning Analytics for Peer-assessment: (Dis)advantages, Reliability and Implementation
Learning analytics deals with the data that occurs from students' interaction with ICT: collecting data, analyzing and reporting that can influence learning and teaching. Analysis of validity and reliability of assessmen...
Sampling Individually Fundamental Simplexes as Sets of Players’ Mixed Strategies in Finite Noncooperative Game for Applicable Approximate Nash Equilibrium Situations with Possible Concessions
In finite noncooperative game, a method for finding approximate Nash equilibrium situations is developed. The method is prior-based on sampling fundamental simplexes being the sets of players’ mixed strategies. Whereas t...