Abstract
Since the traditional classic hash function structure (MD structure) is suffering from all kinds of attacks, the research of new hash function structure becomes hot issue. This paper analyses these attacks, based on MD structure, this paper brings in two security parameters and improves the message padding scheme, and then designs a Double-Serial iterative structure. In this structure, since there are more message blocks affecting the chaining variables, it can not only avoid the traditional second collision attack, multicollision attack and second preimage attack of long message, but also accelerate the message diffusion and enhance the avalanche effect. According to the efficiency analysis and security authentication, this proposed structure improves security and has the same efficiency of Double-Pipe structure.











Similar content being viewed by others
References
Wang X., Feng D., & Lai X. (2004) Collisions for some hash functions MD4, MD5, HAVAL-128, RIPEMD. Cryptology ePrint Archive, Report 2004/199. http://eprint.iacr.org/2004/199.pdf.
Boer B. D., & Bosselaers A. (1994). Collisions for the compression function of MD5. Eurocrypt 1993, LNCS 765, pp. 293–304.
Dobbertin H. (2001). Cryptanalysis of MD5 compress. In Advances in Cryptology, Eurocrypt’96 Rump Session (Vol. 11, pp. 253–271).
Chabaud F., & Joux A. (1998) Differential collisions in SHA-0. Crypto 1998, LNCS 1462, pp. 56–71.
Lucks S. (2005). A failure-friendly design principle for hash functions. Asiacrypt 2005, LNCS 3788 pp. 474–494.
Rivest R. L. (2005). Abelian square-free dithering for iterated hash functions. Presented at ECryt Hash Function Workshop. June, 2005, Cracow.
Biham E., Dunkelman O. (2007). A framework for iterative hash functions—HAIFA. Cryptology ePrint Archive: Report 2007/278.
Bertoni G., Daeman J., Peeters M., & Assche G. V. (2007). Sponge functions. ECRYPT Hash Workshop 2007. http://www.csrc.nist.gov/pki/HashWorkshop/PublicComments/2007May.html.
Tiwari, H., & Asawa, K. (2012). A secure and efficient cryptographic hash function based on NewFORK-256. Egyptian Informatics Journal, 13, 199–208.
Yantao, L., Xiang, L., Xiangwei, L. (2016). A fast and efficient hash function based on generalized chaotic mapping with variable parameters. Neural Computing Applications. doi:10.1007/s00521-015-2158-7.
Yantao, L. (2016). Collision analysis and improvement of a hash function based on chaotic tent map. Optik, 127, 4484–4489.
Ping, Z., Geng, Z., Lequan, M., & Xiaodong, L. (2014). Novel hash function based on coupled chaotic map lattice. Chinese Journal of Electronics, 23(4), 836–841.
Abdulaziz, M., Khalil, I., Imad, F., & Mohammad, A. (2015). A new design of cryptographic hash function: gear. International Journal on Perceptive and Cognitive Computing, 1(1), 29–34.
Acknowledgments
This work was supported by the National Nature Science Foundation of China under Grant 61502314, 61171072, and the Science and Technology Projects of Shenzhen (JCYJ20130329115832637 and ZDSYS20140430164957660), Tencent Rhinoceros Birds Scientific Research Foundation (2015), the Technology Planning Project (Grant No. 2014B010118005) from Guangdong Province, China, the Science and Technology Plan Projects of Shenzhen (JCYJ 20150324140036830, JCYJ 20160307115030281, 20160224144857159).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, Y., chen, F., Zhang, X. et al. Research on the Hash Function Structures and its Application. Wireless Pers Commun 94, 2969–2985 (2017). https://doi.org/10.1007/s11277-016-3760-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3760-4