Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Analyzing Digital Signature Robustness with Message Digest Algorithms

Print
PDF
IJCA Special Issue on Communication Security
© 2012 by IJCA Journal
comnetcs - Number 1
Year of Publication: 2012
Authors:
Rubina B. Patel
Naveen Chaudhary

Rubina B Patel and Naveen Chaudhary. Article: Analyzing Digital Signature Robustness with Message Digest Algorithms. IJCA Special Issue on Communication Security comnetcs(1):41-44, March 2012. Full text available. BibTeX

@article{key:article,
	author = {Rubina B. Patel and Naveen Chaudhary},
	title = {Article: Analyzing Digital Signature Robustness with Message Digest Algorithms},
	journal = {IJCA Special Issue on Communication Security},
	year = {2012},
	volume = {comnetcs},
	number = {1},
	pages = {41-44},
	month = {March},
	note = {Full text available}
}

Abstract

A hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, called the message digest, such that any change to the data will change the digest value. The message digest are being extensively used for digital signature for online transactions. In this paper we have analyzed the robustness of various message digest with respect to digital signature. The repetitive sequences in the digest will decrease the robustness of the message digest as it can lead to same message digest for differing message blocks. In this paper the robustness of message digest is analyzed with respect to sequence repetitions as digest with more repetitive sequence are more likely or have increased probability of generating the same digest for differing message blocks. We have analyzed the robustness of various popular message digest algorithms such as MD5, SHA1, RIEMD160, PANAMA, and TIGER.

References

  • Kahate, Atul 2003. Cryptography and Network Security. Second edition. Tata McGraw-Hill Pvt.
  • Curry, Ian March 2001 An Introduction to Cryptography and Digital Signatures. Version 2.0
  • Silva, John Edward January 15, 2003 An Overview of Cryptographic Hash Functions and Their Uses. GIAC Security Essentials Practical. Version 1.4b. Option 1
  • Rivest, R. April 1992. The MD5 Message-Digest Algorithm. MIT Laboratory for Computer Science and RSA Data Security, Inc.
  • CryptoBytes, autumn 1997. The technical newsletter of RSA Laboratories. A division of RSA Data Security, Inc RSA Laboratories Volume 3, Number 2.
  • Rompay, Bart Van, June 2004. Analysis and Design of Cryptographic Hash functions, Mac algorithms and Block ciphers”
  • http:// www.quadibloc.com/ crypto/co4821.htm
  • Ross, Anderson and Eli, Biham, Tiger: A Fast new hash function” by
  • http://www.slavasoft.com/?source=HashCalc.exe