DocumentCode :
3041714
Title :
Cryptographic security evaluation of MD4 hash function
Author :
Abdel-azeem, Essam ; Seireg, Reda ; Shaheen, Samir I.
Author_Institution :
Fac. of Eng., Cairo Univ., Giza, Egypt
fYear :
1996
fDate :
19-21 Mar 1996
Firstpage :
345
Lastpage :
354
Abstract :
Cryptography is the only powerful tool for achieving high levels of information security in a computer networks environment. The ISO have proposed five security service groups including, confidentiality, authentication, data integrity, non-repudiation, and access control. Cryptography can support implementation of all these security services, by using various cryptographic techniques, which include among other things conventional secret key algorithms, public-key algorithms, authentication procedures, and different digital signature schemes. Hash functions, in cryptography, are used for digital signature applications and authentication procedures. It is advisable, for cryptographic reasons, to sign only hashed messages. A secure hash function must be a one-way and collision-free function. Cryptographic security of hash functions could be evaluated, so far, either by conducting detailed cryptanalysis, or by using computational complexity theory. Each of these methods has its own shortcomings. A new scheme for evaluating the cryptographic security of hash functions is proposed. The proposed scheme is simple, fast, and based on a solid mathematical model offered by Markov process. The proposed scheme is used to evaluate the cryptographic security of the Message Digest MD-4 algorithm. The results are in accordance with what was conjectured and published
Keywords :
ISO standards; Markov processes; cryptography; data integrity; message authentication; telecommunication standards; ISO; MD4 hash function; Markov process; Message Digest MD-4 algorithm; access control; authentication; collision-free function; computational complexity theory; computer networks; confidentiality; cryptanalysis; cryptographic security; cryptography; data integrity; digital signature schemes; information security; mathematical model; nonrepudiation; public-key algorithms; secret key algorithms; secure hash function; security service groups; Access control; Authentication; Computational complexity; Computer networks; Cryptography; Data security; Digital signatures; ISO; Information security; Public key;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Radio Science Conference, 1996. NRSC '96., Thirteenth National
Conference_Location :
Cairo
Print_ISBN :
0-7803-3656-9
Type :
conf
DOI :
10.1109/NRSC.1996.551126
Filename :
551126
Link To Document :
بازگشت