Skoči na glavni sadržaj

Izvorni znanstveni članak

https://doi.org/10.2498/cit.1002181

Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm

Harshvardhan Tiwari orcid id orcid.org/0000-0002-9342-7518 ; Jaypee Institute of Information Technology (JIIT), Noida (Uttar Pradesh), India
Krishna Asawa ; Jaypee Institute of Information Technology (JIIT), Noida (Uttar Pradesh), India


Puni tekst: engleski PDF 999 Kb

str. 223-233

preuzimanja: 758

citiraj


Sažetak

Cryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash functions such as MD5, SHA-0, SHA-1 and RIPEMD-160 are built on Merkle-Damgard iterative method. Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions and their underlying Merkle-Damgard construction. In this paper we propose a hash function which follows design principle of SHA-1 and is based on dither construction. Its compression function takes three inputs and generates a single output of 160-bit length. An extra input to a compression function is generated through a fast pseudo-random function. Dither construction shows strong resistance against major generic and other cryptanalytic attacks. The security of proposed hash function against generic attacks, differential attack, birthday attack and statistical attack was analyzed in detail. It is exhaustedly compared with SHA-1 because hash functions from SHA-2 and SHA-3 are of higher bit length and known to be more secure than SHA-1. It is shown that the proposed hash function has high sensitivity to an input message and is secure against different cryptanalytic attacks.

Ključne riječi

cryptographic hash function; MD4; SHA-1; RIPEMD-160; generic attacks

Hrčak ID:

114774

URI

https://hrcak.srce.hr/114774

Datum izdavanja:

29.1.2014.

Posjeta: 1.299 *