Merkle-Damgård Construction Method and Alternatives: A Review
Journal Title: Journal of Information and Organizational Sciences - Year 2017, Vol 41, Issue 2
Abstract
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Damgård construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgård construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgård construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.
Authors and Affiliations
Harshvardhan Tiwari
A Study on Knowledge Gain and Retention when Using Multimedia Learning Materials of Different Quality
The usage of multimedia has proven to foster meaningful learning, but not every multimedia resource will necessarily contribute to the teaching-learning process. Since for the development of multimedia learning materials...
Key Factors of an Organization’s Environment for the Acquisition and Assimilation of an Innovation
The paper deals with influential factors of an organization’s environment in the initial phase of diffusion of innovations (DOI) within the organization. A qualitative research was carried out with two expert groups: one...
Discretization for Naive Bayes Taking the Specifics of Heart Data into Account
At the present time heart disease is a major cause of death. Factors such as physical inactiveness, obesity, diabetes, social isolation and aging are expected to make the situation worse. It is worsened even further with...
The Use of Support Vector Machines When Designing a User-Defined Niche Search Engine
This study presents the construction of a niche search engine, whose search topic domain is to be user-defined. The specific focus of this study is the investigation of the role that a Support Vector Machine plays when c...
A Guidance Based Approach for Enhancing the e-Government Interoperability
Developing e-Government interoperability in the government context is a complex task. As interoperability in government context is associated and hindered by many challenges and barriers connected to government nature of...