hrcak mascot   Srce   HID

Izvorni znanstveni članak
https://doi.org/10.2498/cit.1002181

Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm

Harshvardhan Tiwari   ORCID icon orcid.org/0000-0002-9342-7518 ; Jaypee Institute of Information Technology (JIIT), Noida (Uttar Pradesh), India
Krishna Asawa ; Jaypee Institute of Information Technology (JIIT), Noida (Uttar Pradesh), India

Puni tekst: engleski, PDF (999 KB) str. 223-233 preuzimanja: 559* citiraj
APA 6th Edition
Tiwari, H. i Asawa, K. (2013). Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm. Journal of computing and information technology, 21 (4), 223-233. https://doi.org/10.2498/cit.1002181
MLA 8th Edition
Tiwari, Harshvardhan i Krishna Asawa. "Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm." Journal of computing and information technology, vol. 21, br. 4, 2013, str. 223-233. https://doi.org/10.2498/cit.1002181. Citirano 18.09.2020.
Chicago 17th Edition
Tiwari, Harshvardhan i Krishna Asawa. "Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm." Journal of computing and information technology 21, br. 4 (2013): 223-233. https://doi.org/10.2498/cit.1002181
Harvard
Tiwari, H., i Asawa, K. (2013). 'Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm', Journal of computing and information technology, 21(4), str. 223-233. https://doi.org/10.2498/cit.1002181
Vancouver
Tiwari H, Asawa K. Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm. Journal of computing and information technology [Internet]. 2013 [pristupljeno 18.09.2020.];21(4):223-233. https://doi.org/10.2498/cit.1002181
IEEE
H. Tiwari i K. Asawa, "Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm", Journal of computing and information technology, vol.21, br. 4, str. 223-233, 2013. [Online]. https://doi.org/10.2498/cit.1002181

Sažetak
Cryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash functions such as MD5, SHA-0, SHA-1 and RIPEMD-160 are built on Merkle-Damgard iterative method. Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions and their underlying Merkle-Damgard construction. In this paper we propose a hash function which follows design principle of SHA-1 and is based on dither construction. Its compression function takes three inputs and generates a single output of 160-bit length. An extra input to a compression function is generated through a fast pseudo-random function. Dither construction shows strong resistance against major generic and other cryptanalytic attacks. The security of proposed hash function against generic attacks, differential attack, birthday attack and statistical attack was analyzed in detail. It is exhaustedly compared with SHA-1 because hash functions from SHA-2 and SHA-3 are of higher bit length and known to be more secure than SHA-1. It is shown that the proposed hash function has high sensitivity to an input message and is secure against different cryptanalytic attacks.

Ključne riječi
cryptographic hash function; MD4; SHA-1; RIPEMD-160; generic attacks

Hrčak ID: 114774

URI
https://hrcak.srce.hr/114774

Posjeta: 757 *