Merkle-Damgård施工方法和备选方案:综述

IF 0.3 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Journal of Information and Organizational Sciences Pub Date : 2017-12-13 DOI:10.31341/JIOS.41.2.9
Harshvardhan Tiwari
{"title":"Merkle-Damgård施工方法和备选方案:综述","authors":"Harshvardhan Tiwari","doi":"10.31341/JIOS.41.2.9","DOIUrl":null,"url":null,"abstract":"Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgard construction method with constant initialization vector. Merkle-Damgard construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgard construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgard construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"41 1","pages":"283-304"},"PeriodicalIF":0.3000,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Merkle-Damgård Construction Method and Alternatives: A Review\",\"authors\":\"Harshvardhan Tiwari\",\"doi\":\"10.31341/JIOS.41.2.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgard construction method with constant initialization vector. Merkle-Damgard construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgard construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgard construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.\",\"PeriodicalId\":43428,\"journal\":{\"name\":\"Journal of Information and Organizational Sciences\",\"volume\":\"41 1\",\"pages\":\"283-304\"},\"PeriodicalIF\":0.3000,\"publicationDate\":\"2017-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information and Organizational Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31341/JIOS.41.2.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information and Organizational Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31341/JIOS.41.2.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 8

摘要

密码哈希函数是信息安全领域中重要的密码工具。MD5和SHA-1等最广泛使用的哈希函数的设计是基于压缩函数的迭代,采用不变初始化向量的Merkle-Damgard构造方法。Merkle-Damgard构造表明哈希函数的安全性取决于压缩函数的安全性。针对基于Merkle-Damgard构造的哈希函数的几次攻击促使研究人员提出了不同的密码结构,以增强哈希函数对差分和泛型攻击的安全性。密码学社区一直在寻找这些弱哈希函数的替代品,他们提出了基于Merkle-Damgard构造的不同变体的新哈希函数。作为公开竞争的结果,NIST宣布Keccak为SHA-3标准。本文综述了加密哈希函数、其安全性要求以及不同的压缩函数设计方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Merkle-Damgård Construction Method and Alternatives: A Review
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgard construction method with constant initialization vector. Merkle-Damgard construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgard construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgard construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Information and Organizational Sciences
Journal of Information and Organizational Sciences COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS-
CiteScore
1.10
自引率
0.00%
发文量
14
审稿时长
12 weeks
期刊最新文献
Employing a Time Series Forecasting Model for Tourism Demand Using ANFIS A Mobile Based Pharmacy Store Location-aware System The Contribution of Women on Corporate Boards Croatian Journals Covered by SCIE/SSCI Towards an Improved Framework for E-Risk Management for Digital Financial Services (DFS) in Ugandan Banks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1