Merkle-Damgård Construction Method and Alternatives: A Review

Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Da...

Full description

Bibliographic Details
Main Author: Harshvardhan Tiwari
Format: Article
Language:English
Published: University of Zagreb, Faculty of organization and informatics 2017-01-01
Series:Journal of Information and Organizational Sciences
Subjects:
Online Access:https://hrcak.srce.hr/file/281168
_version_ 1797207778766356480
author Harshvardhan Tiwari
author_facet Harshvardhan Tiwari
author_sort Harshvardhan Tiwari
collection DOAJ
description Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Damgård construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgård construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgård construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.
first_indexed 2024-04-24T09:28:19Z
format Article
id doaj.art-e6732c3b987e42418a5c6ac13c7150c3
institution Directory Open Access Journal
issn 1846-3312
1846-9418
language English
last_indexed 2024-04-24T09:28:19Z
publishDate 2017-01-01
publisher University of Zagreb, Faculty of organization and informatics
record_format Article
series Journal of Information and Organizational Sciences
spelling doaj.art-e6732c3b987e42418a5c6ac13c7150c32024-04-15T14:29:38ZengUniversity of Zagreb, Faculty of organization and informaticsJournal of Information and Organizational Sciences1846-33121846-94182017-01-0141228330410.31341/jios.41.2.9Merkle-Damgård Construction Method and Alternatives: A ReviewHarshvardhan Tiwari0Centre for Incubation, Innovation, Research and Consultancy (CIIRC), Jyothy Institute of Technology, Bangalore, Karnataka, IndiaCryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Damgård construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgård construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgård construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.https://hrcak.srce.hr/file/281168Cryptographic hash functionInformation securityMerkle-Damgård constructionMD5SHA-1Differential attacks
spellingShingle Harshvardhan Tiwari
Merkle-Damgård Construction Method and Alternatives: A Review
Journal of Information and Organizational Sciences
Cryptographic hash function
Information security
Merkle-Damgård construction
MD5
SHA-1
Differential attacks
title Merkle-Damgård Construction Method and Alternatives: A Review
title_full Merkle-Damgård Construction Method and Alternatives: A Review
title_fullStr Merkle-Damgård Construction Method and Alternatives: A Review
title_full_unstemmed Merkle-Damgård Construction Method and Alternatives: A Review
title_short Merkle-Damgård Construction Method and Alternatives: A Review
title_sort merkle damgard construction method and alternatives a review
topic Cryptographic hash function
Information security
Merkle-Damgård construction
MD5
SHA-1
Differential attacks
url https://hrcak.srce.hr/file/281168
work_keys_str_mv AT harshvardhantiwari merkledamgardconstructionmethodandalternativesareview