The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions

2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)(2019)

引用 11|浏览22
暂无评分
摘要
This paper presents a Sponge structure modulation of the MD5 and SHA-1 hash functions. The work employs the Keccak permutation function to build the proposed scheme. The work discusses the main two security breaches that threaten the cryptography hash standards which are collision and length extension attacks. Through analyzing several examples of collided messages of both algorithms (SHA-1 and MD5), we describe the potentials to overcome the collision and length extension attacks. Moreover, a proper replacement technique to avoid such attacks is discussed in this paper.
更多
查看译文
关键词
Length extension attack,collision attack,cryptography,hash
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要