Merkle-Damgård Construction Method and Alternatives: A Review
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Da...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Zagreb, Faculty of organization and informatics
2017-01-01
|
Series: | Journal of Information and Organizational Sciences |
Subjects: | |
Online Access: | https://hrcak.srce.hr/file/281168 |
_version_ | 1797207778766356480 |
---|---|
author | Harshvardhan Tiwari |
author_facet | Harshvardhan Tiwari |
author_sort | Harshvardhan Tiwari |
collection | DOAJ |
description | Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Damgård construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgård construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgård construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function. |
first_indexed | 2024-04-24T09:28:19Z |
format | Article |
id | doaj.art-e6732c3b987e42418a5c6ac13c7150c3 |
institution | Directory Open Access Journal |
issn | 1846-3312 1846-9418 |
language | English |
last_indexed | 2024-04-24T09:28:19Z |
publishDate | 2017-01-01 |
publisher | University of Zagreb, Faculty of organization and informatics |
record_format | Article |
series | Journal of Information and Organizational Sciences |
spelling | doaj.art-e6732c3b987e42418a5c6ac13c7150c32024-04-15T14:29:38ZengUniversity of Zagreb, Faculty of organization and informaticsJournal of Information and Organizational Sciences1846-33121846-94182017-01-0141228330410.31341/jios.41.2.9Merkle-Damgård Construction Method and Alternatives: A ReviewHarshvardhan Tiwari0Centre for Incubation, Innovation, Research and Consultancy (CIIRC), Jyothy Institute of Technology, Bangalore, Karnataka, IndiaCryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Damgård construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgård construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgård construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.https://hrcak.srce.hr/file/281168Cryptographic hash functionInformation securityMerkle-Damgård constructionMD5SHA-1Differential attacks |
spellingShingle | Harshvardhan Tiwari Merkle-Damgård Construction Method and Alternatives: A Review Journal of Information and Organizational Sciences Cryptographic hash function Information security Merkle-Damgård construction MD5 SHA-1 Differential attacks |
title | Merkle-Damgård Construction Method and Alternatives: A Review |
title_full | Merkle-Damgård Construction Method and Alternatives: A Review |
title_fullStr | Merkle-Damgård Construction Method and Alternatives: A Review |
title_full_unstemmed | Merkle-Damgård Construction Method and Alternatives: A Review |
title_short | Merkle-Damgård Construction Method and Alternatives: A Review |
title_sort | merkle damgard construction method and alternatives a review |
topic | Cryptographic hash function Information security Merkle-Damgård construction MD5 SHA-1 Differential attacks |
url | https://hrcak.srce.hr/file/281168 |
work_keys_str_mv | AT harshvardhantiwari merkledamgardconstructionmethodandalternativesareview |