A new hash function based on combination of existing digest algorithms

Hamid Mirvaziri, Kasmiran Jumari, Mahamod Ismail, Z. Mohd Hanapi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Hash functions were introduced in cryptology as a tool to protect the authenticity of information. SHA-1, MD5, and RIPEMD are among the most commonly-used hash function message digest algorithms Nowadays scientists have found weaknesses in a number of hash functions, including MD5, SHA and RIPEMD so the purpose of this paper is combination of some function to reinforce these functions. Recent works have presented collision attacks on SHA-1, MD5 hash functions so the natural response to overcome this threat was assessing the weak points of these protocols that actually depend on collision resistance for their security, and potentially schedule an upgrade to a stronger hash function. Other options involve altering the protocol in some way. This work suggests a different option. We present several simple message pre-processing techniques and show how the techniques can be combined with MD5 or SHA-1 so that applications are no longer vulnerable to the known collision attacks.

Original languageEnglish
Title of host publication2007 5th Student Conference on Research and Development, SCORED
DOIs
Publication statusPublished - 2007
Event2007 5th Student Conference on Research and Development, SCORED - Selangor
Duration: 11 Dec 200712 Dec 2007

Other

Other2007 5th Student Conference on Research and Development, SCORED
CitySelangor
Period11/12/0712/12/07

Fingerprint

Hash function
authenticity
threat
Attack
Upgrade
Authenticity
Threat
Schedule

Keywords

  • Collision resistant
  • Cryptography
  • Hash function
  • Security

ASJC Scopus subject areas

  • Education
  • Management Science and Operations Research

Cite this

Mirvaziri, H., Jumari, K., Ismail, M., & Hanapi, Z. M. (2007). A new hash function based on combination of existing digest algorithms. In 2007 5th Student Conference on Research and Development, SCORED [4451409] https://doi.org/10.1109/SCORED.2007.4451409

A new hash function based on combination of existing digest algorithms. / Mirvaziri, Hamid; Jumari, Kasmiran; Ismail, Mahamod; Hanapi, Z. Mohd.

2007 5th Student Conference on Research and Development, SCORED. 2007. 4451409.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mirvaziri, H, Jumari, K, Ismail, M & Hanapi, ZM 2007, A new hash function based on combination of existing digest algorithms. in 2007 5th Student Conference on Research and Development, SCORED., 4451409, 2007 5th Student Conference on Research and Development, SCORED, Selangor, 11/12/07. https://doi.org/10.1109/SCORED.2007.4451409
Mirvaziri H, Jumari K, Ismail M, Hanapi ZM. A new hash function based on combination of existing digest algorithms. In 2007 5th Student Conference on Research and Development, SCORED. 2007. 4451409 https://doi.org/10.1109/SCORED.2007.4451409
Mirvaziri, Hamid ; Jumari, Kasmiran ; Ismail, Mahamod ; Hanapi, Z. Mohd. / A new hash function based on combination of existing digest algorithms. 2007 5th Student Conference on Research and Development, SCORED. 2007.
@inproceedings{11007f84eecf4f34bc9ecc5ff7f0b744,
title = "A new hash function based on combination of existing digest algorithms",
abstract = "Hash functions were introduced in cryptology as a tool to protect the authenticity of information. SHA-1, MD5, and RIPEMD are among the most commonly-used hash function message digest algorithms Nowadays scientists have found weaknesses in a number of hash functions, including MD5, SHA and RIPEMD so the purpose of this paper is combination of some function to reinforce these functions. Recent works have presented collision attacks on SHA-1, MD5 hash functions so the natural response to overcome this threat was assessing the weak points of these protocols that actually depend on collision resistance for their security, and potentially schedule an upgrade to a stronger hash function. Other options involve altering the protocol in some way. This work suggests a different option. We present several simple message pre-processing techniques and show how the techniques can be combined with MD5 or SHA-1 so that applications are no longer vulnerable to the known collision attacks.",
keywords = "Collision resistant, Cryptography, Hash function, Security",
author = "Hamid Mirvaziri and Kasmiran Jumari and Mahamod Ismail and Hanapi, {Z. Mohd}",
year = "2007",
doi = "10.1109/SCORED.2007.4451409",
language = "English",
isbn = "1424414709",
booktitle = "2007 5th Student Conference on Research and Development, SCORED",

}

TY - GEN

T1 - A new hash function based on combination of existing digest algorithms

AU - Mirvaziri, Hamid

AU - Jumari, Kasmiran

AU - Ismail, Mahamod

AU - Hanapi, Z. Mohd

PY - 2007

Y1 - 2007

N2 - Hash functions were introduced in cryptology as a tool to protect the authenticity of information. SHA-1, MD5, and RIPEMD are among the most commonly-used hash function message digest algorithms Nowadays scientists have found weaknesses in a number of hash functions, including MD5, SHA and RIPEMD so the purpose of this paper is combination of some function to reinforce these functions. Recent works have presented collision attacks on SHA-1, MD5 hash functions so the natural response to overcome this threat was assessing the weak points of these protocols that actually depend on collision resistance for their security, and potentially schedule an upgrade to a stronger hash function. Other options involve altering the protocol in some way. This work suggests a different option. We present several simple message pre-processing techniques and show how the techniques can be combined with MD5 or SHA-1 so that applications are no longer vulnerable to the known collision attacks.

AB - Hash functions were introduced in cryptology as a tool to protect the authenticity of information. SHA-1, MD5, and RIPEMD are among the most commonly-used hash function message digest algorithms Nowadays scientists have found weaknesses in a number of hash functions, including MD5, SHA and RIPEMD so the purpose of this paper is combination of some function to reinforce these functions. Recent works have presented collision attacks on SHA-1, MD5 hash functions so the natural response to overcome this threat was assessing the weak points of these protocols that actually depend on collision resistance for their security, and potentially schedule an upgrade to a stronger hash function. Other options involve altering the protocol in some way. This work suggests a different option. We present several simple message pre-processing techniques and show how the techniques can be combined with MD5 or SHA-1 so that applications are no longer vulnerable to the known collision attacks.

KW - Collision resistant

KW - Cryptography

KW - Hash function

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=50449102684&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=50449102684&partnerID=8YFLogxK

U2 - 10.1109/SCORED.2007.4451409

DO - 10.1109/SCORED.2007.4451409

M3 - Conference contribution

AN - SCOPUS:50449102684

SN - 1424414709

SN - 9781424414703

BT - 2007 5th Student Conference on Research and Development, SCORED

ER -