scispace - formally typeset
Open Access

On the security of dedicated hash functions

Bart Van Rompay, +2 more
- pp 103-110
TLDR
This paper will describe attacks on MD4, MD5 and RIPEMD, and discuss the design and security of the hash functions SHA-1 andRIPEMD-160 which are included in the new standard ISO/IEC 10118-3.
Abstract
Cryptographic hash functions are an important building block for a wide range of applications such as the authentication of information, digital signatures and the protection of pass-phrases. The most popular hash functions are the custom designed iterative hash functions from the MD4 family. Over the years various results on the cryptanalysis of these functions have become available and this paper intends to summarize these results and their impact. We will describe attacks on MD4, MD5 and RIPEMD, and discuss the design and security of the hash functions SHA-1 and RIPEMD-160 which are included in the new standard ISO/IEC 10118-3.

read more

Citations
More filters
Proceedings Article

An analysis of compare-by-hash

TL;DR: Comparison-by-hash decides whether two blocks are identical to each other by comparing their hash values, using a collision-resistant hash such as SHA-1[5].
Proceedings ArticleDOI

ADMAD: Application-Driven Metadata Aware De-duplication Archival Storage System

TL;DR: ADMAD is proposed: an application-driven metadata aware de-duplication archival storage system, which makes use of certain meta-data information of different levels in the I/O path to direct the file partitioning into more meaningful data chunks (MC) to maximally reduce the inter-file level duplications.
Proceedings ArticleDOI

R-ADMAD: high reliability provision for large-scale de-duplication archival storage systems

TL;DR: Experimental results show that R-ADMAD can provide the same storage utilization as RAID-like schemes, but comparable reliability to replication based schemes with much more redundancy.
Proceedings ArticleDOI

Semantic Data De-duplication for archival storage systems

TL;DR: In this article, semantic data de-duplication (SDD) is proposed, which makes use of the semantic information in the I/O path (such as file type, file format, application hints and filesystem metadata) of the archival files to direct the dividing a file into semantic chunks (SC).
References
More filters
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Book

Differential Cryptanalysis of the Data Encryption Standard

TL;DR: This book introduces a new cryptographic method, called differential cryptanalysis, which can be applied to analyze cryptosystems, and describes the cryptanalysis of DES, deals with the influence of its building blocks on security, and analyzes modified variants.
Book ChapterDOI

The MD4 Message-Digest Algorithm

TL;DR: The MD4 message digest algorithm takes an input message of arbitrary length and produces an output 128-bit "fingerprint" or "message digest", in such a way that it is (hopefully) computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest.
Book ChapterDOI

RIPEMD-160: A Strengthened Version of RIPEMD

TL;DR: A new version of RIPEMD with a 160-bit result is proposed, as well as a plug-in substitute for RIPEMd with a 128- bit result, and the software performance of several MD4-based algorithms is compared.