hrcak mascot   Srce   HID

Journal of Information and Organizational Sciences, Vol. 41 No. 2, 2017.

Pregledni rad
https://doi.org/10.31341/jios.41.2.9

Merkle-Damgård Construction Method and Alternatives: A Review

Harshvardhan Tiwari   ORCID icon orcid.org/0000-0002-9342-7518 ; Centre for Incubation, Innovation, Research and Consultancy (CIIRC), Jyothy Institute of Technology, Bangalore, Karnataka, India

Puni tekst: engleski, pdf (1 MB) str. 283-304 preuzimanja: 107* citiraj
APA 6th Edition
Tiwari, H. (2017). Merkle-Damgård Construction Method and Alternatives: A Review. Journal of Information and Organizational Sciences, 41 (2), 283-304. https://doi.org/10.31341/jios.41.2.9
MLA 8th Edition
Tiwari, Harshvardhan. "Merkle-Damgård Construction Method and Alternatives: A Review." Journal of Information and Organizational Sciences, vol. 41, br. 2, 2017, str. 283-304. https://doi.org/10.31341/jios.41.2.9. Citirano 24.04.2019.
Chicago 17th Edition
Tiwari, Harshvardhan. "Merkle-Damgård Construction Method and Alternatives: A Review." Journal of Information and Organizational Sciences 41, br. 2 (2017): 283-304. https://doi.org/10.31341/jios.41.2.9
Harvard
Tiwari, H. (2017). 'Merkle-Damgård Construction Method and Alternatives: A Review', Journal of Information and Organizational Sciences, 41(2), str. 283-304. doi: https://doi.org/10.31341/jios.41.2.9
Vancouver
Tiwari H. Merkle-Damgård Construction Method and Alternatives: A Review. Journal of Information and Organizational Sciences [Internet]. 2017 [pristupljeno 24.04.2019.];41(2):283-304. doi: https://doi.org/10.31341/jios.41.2.9
IEEE
H. Tiwari, "Merkle-Damgård Construction Method and Alternatives: A Review", Journal of Information and Organizational Sciences, vol.41, br. 2, str. 283-304, 2017. [Online]. doi: https://doi.org/10.31341/jios.41.2.9

Sažetak
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Damgård construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgård construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgård construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.

Ključne riječi
Cryptographic hash function; Information security; Merkle-Damgård construction; MD5; SHA-1; Differential attacks

Hrčak ID: 190745

URI
https://hrcak.srce.hr/190745

Posjeta: 151 *