Enhancing the MD - Strengthening & Designing Scalable 1 - Way Hash Families

نویسندگان

  • Neil Kauer
  • Wachovia Bank
  • Yuliang Zheng
چکیده

One-way hash algorithms are an indispensable tool in data security. Over the last decade or so a number of one-way hash algorithms have been designed and many of them have been used in numerous applications. Recent progress in cryptanalytic attacks on one-way hash algorithms by Wang and co-workers, however, has brought up the urgency of research into new and more secure algorithms. The goal of this paper is two-folded. On one hand we propose a simple technique to affix authentication tags to messages prior to being hashed by an iterative oneway hash algorithm with the aim of increasing the overall security of the algorithm against cryptanalytic attacks. One the other hand we advocate the importance of a system oriented approach towards the design and deployment of new families of one-way hash algorithms that support greater scalability and facilitate migration to newer member algorithms upon the compromise of deployed ones. We base our observations on a common sense premise that there is no specific one-way hash algorithm can remain secure forever and it will eventually be broken by a cryptanalytic attack faster than exhaustive research. ∗Corporate Information Security, Wachovia Bank, 1525 West T. Harris Blvd, Charlotte, NC 28288, USA. {neil.kauer, tony.suarez}@wachovia.com †Information Security and Assurance Center, UNC Charlotte, 9201 University City Blvd, Charlotte, NC 28223, USA. [email protected]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms

One-way hash algorithms are an indispensable tool in data security. Over the last decade or so a number of one-way hash algorithms have been designed and many of them have been used in numerous applications. Recent progress in cryptanalytic attacks on one-way hash algorithms by Wang and co-workers, however, has brought up the urgency of research into new and more secure algorithms. The goal of ...

متن کامل

XSA-strengthening: Strengthening MD5 and Other Iterated Hash Functions Through Variable-length External Message Expansion

In recent years, it has been demonstrated that collisions can be systematically constructed for some popular cryptographic hash algorithms, such as MD5 and SHA-1. Various ways of enhancing these hash functions via message pre-processing or external message expansion have been proposed to make them resistant to known collision attacks. Message preprocessing/expansion is a way of creating a new h...

متن کامل

Tradeoff tables for compression functions: how to invert hash values

Hash functions are one of the ubiquitous cryptographic functions used widely for various applications such as digital signatures, data integrity, authentication protocols, MAC algorithms, RNGs, etc. Hash functions are supposed to be one-way, i.e., preimage resistant. One interesting property of hash functions is that they process arbitrary-length messages into fixed-length outputs. In general, ...

متن کامل

Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction

Recently multi-block collision attacks (MBCA) were found on the Merkle-Damg̊ard (MD)-structure based hash functions MD5, SHA-0 and SHA-1. In this paper, we introduce a new cryptographic construction called 3C devised by enhancing the MD construction. We show that the 3C construction is at least as secure as the MD construction against single-block and multi-block collision attacks. This is the f...

متن کامل

A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model

In [1] it was proved that 20 out of 64 PGV-hash functions [2] based on block cipher are collision resistant and one-way-secure in blackbox model of the underlying block cipher. Here, we generalize the definition of PGV-hash function into a hash family and prove that besides the previous 20 hash functions we have 22 more collision resistant and one-way secure hash families. As all these 42 famil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005