Original scientific paper
https://doi.org/10.2498/cit.1002181
Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm
Harshvardhan Tiwari
orcid.org/0000-0002-9342-7518
; Jaypee Institute of Information Technology (JIIT), Noida (Uttar Pradesh), India
Krishna Asawa
; Jaypee Institute of Information Technology (JIIT), Noida (Uttar Pradesh), India
Abstract
Cryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash functions such as MD5, SHA-0, SHA-1 and RIPEMD-160 are built on Merkle-Damgard iterative method. Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions and their underlying Merkle-Damgard construction. In this paper we propose a hash function which follows design principle of SHA-1 and is based on dither construction. Its compression function takes three inputs and generates a single output of 160-bit length. An extra input to a compression function is generated through a fast pseudo-random function. Dither construction shows strong resistance against major generic and other cryptanalytic attacks. The security of proposed hash function against generic attacks, differential attack, birthday attack and statistical attack was analyzed in detail. It is exhaustedly compared with SHA-1 because hash functions from SHA-2 and SHA-3 are of higher bit length and known to be more secure than SHA-1. It is shown that the proposed hash function has high sensitivity to an input message and is secure against different cryptanalytic attacks.
Keywords
cryptographic hash function; MD4; SHA-1; RIPEMD-160; generic attacks
Hrčak ID:
114774
URI
Publication date:
29.1.2014.
Visits: 1.796 *