CFP last date
20 January 2025
Reseach Article

Analyzing Digital Signature Robustness with Message Digest Algorithms

Published on March 2012 by Rubina B. Patel, Naveen Chaudhary
Communication Security
Foundation of Computer Science USA
COMNETCS - Number 1
March 2012
Authors: Rubina B. Patel, Naveen Chaudhary
0be22696-ec1f-46a2-9565-7bb557cb39c2

Rubina B. Patel, Naveen Chaudhary . Analyzing Digital Signature Robustness with Message Digest Algorithms. Communication Security. COMNETCS, 1 (March 2012), 41-44.

@article{
author = { Rubina B. Patel, Naveen Chaudhary },
title = { Analyzing Digital Signature Robustness with Message Digest Algorithms },
journal = { Communication Security },
issue_date = { March 2012 },
volume = { COMNETCS },
number = { 1 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 41-44 },
numpages = 4,
url = { /specialissues/comnetcs/number1/5480-1008/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Communication Security
%A Rubina B. Patel
%A Naveen Chaudhary
%T Analyzing Digital Signature Robustness with Message Digest Algorithms
%J Communication Security
%@ 0975-8887
%V COMNETCS
%N 1
%P 41-44
%D 2012
%I International Journal of Computer Applications
Abstract

A hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, called the message digest, such that any change to the data will change the digest value. The message digest are being extensively used for digital signature for online transactions. In this paper we have analyzed the robustness of various message digest with respect to digital signature. The repetitive sequences in the digest will decrease the robustness of the message digest as it can lead to same message digest for differing message blocks. In this paper the robustness of message digest is analyzed with respect to sequence repetitions as digest with more repetitive sequence are more likely or have increased probability of generating the same digest for differing message blocks. We have analyzed the robustness of various popular message digest algorithms such as MD5, SHA1, RIEMD160, PANAMA, and TIGER.

References
  1. Kahate, Atul 2003. Cryptography and Network Security. Second edition. Tata McGraw-Hill Pvt.
  2. Curry, Ian March 2001 An Introduction to Cryptography and Digital Signatures. Version 2.0
  3. Silva, John Edward January 15, 2003 An Overview of Cryptographic Hash Functions and Their Uses. GIAC Security Essentials Practical. Version 1.4b. Option 1
  4. Rivest, R. April 1992. The MD5 Message-Digest Algorithm. MIT Laboratory for Computer Science and RSA Data Security, Inc.
  5. CryptoBytes, autumn 1997. The technical newsletter of RSA Laboratories. A division of RSA Data Security, Inc RSA Laboratories Volume 3, Number 2.
  6. Rompay, Bart Van, June 2004. Analysis and Design of Cryptographic Hash functions, Mac algorithms and Block ciphers”
  7. http:// www.quadibloc.com/ crypto/co4821.htm
  8. Ross, Anderson and Eli, Biham, Tiger: A Fast new hash function” by
  9. http://www.slavasoft.com/?source=HashCalc.exe
Index Terms

Computer Science
Information Sciences

Keywords

Message Digest Hash function Digital Signature Secure communication Information security