Abstract
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Damgård construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgård construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions against the differential and generic attacks. Cryptographic community had been looking for replacements for these weak hash functions and they have proposed new hash functions based on different variants of Merkle-Damgård construction. As a result of an open competition NIST announced Keccak as a SHA-3 standard. This paper provides a review of cryptographic hash function, its security requirements and different design methods of compression function.
Publisher
Faculty of Organisation and Informatics
Subject
Library and Information Sciences,Computer Science Applications,Information Systems
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Understanding Blockchain Technology;SSRN Electronic Journal;2024
2. Differential Analysis of a Cryptographic Hashing Algorithm HBC-256;Applied Sciences;2022-10-10
3. Developing a New Collision-Resistant Hashing Algorithm;Mathematics;2022-08-04
4. Cryptanalysis of the Modified SHA256;Proceedings of the 2020 4th High Performance Computing and Cluster Technologies Conference & 2020 3rd International Conference on Big Data and Artificial Intelligence;2020-07-03
5. Cryptographic Randomness Test of the Modified Hashing Function of SHA256 to Address Length Extension Attack;Proceedings of the 2020 8th International Conference on Communications and Broadband Networking;2020-04-15