Figure - uploaded by Rogel Quilala
Content may be subject to copyright.
Message inputs with different length

Message inputs with different length

Source publication
Article
Full-text available
Hashes are used to check the integrity of data. This paper modified SHA-1 by incorporating mixing method in every round for better diffusion. The modification increased the hash output to 192-bits. Increasing the output increases the strength because breaking the hash takes longer. Based on the different message types, avalanche percentage of modif...

Citations

... In their work, the structure of MD5 standards was used twice and fed back as an input to the SHA-256 function. Rogel et al. proposed a modified version of the SHA-1 by changing adding multiplexer box in the internal calculation of the intermediate hash value [17]. Moreover, Authors in [18] presented a new architecture that used the Sponge structure model to construct a secure hash standard. ...
Conference Paper
This paper presents a Sponge structure modulation of the MD5 and SHA-1 hash functions. The work employs the Keccak permutation function to build the proposed scheme. The work discusses the main two security breaches that threaten the cryptography hash standards which are collision and length extension attacks. Through analyzing several examples of collided messages of both algorithms (SHA-1 and MD5), we describe the potentials to overcome the collision and length extension attacks. Moreover, a proper replacement technique to avoid such attacks is discussed in this paper.
Article
This paper introduces an improved version of the secure hash algorithms, SHA-1, and SHA-2. The proposed work produces a strengthened secure hash design using the fusion between the SHA-1 and SHA-2 hash standards. This design helps to protect the SHA-1 and SHA-2 against collision and length extension attacks. The proposed design is incorporated in the round steps of the hash functions using the function manipulators of the SHA-1 and SHA-2. Moreover, the proposed design employs a padding method that is different from the one used in the SHA-1 and SHA-2 construction. The proposed design is verified by the official test vectors that were confirmed by the National Institute of Standard and Technology. Moreover, the avalanche effect, hamming distance, and bit-hit properties were studied using different test cases. The proposed design gives over 52 percent of the avalanche effect and over 84 hamming distance. The proposed design was tested against collision attack and produced unique hash values for real collided examples and shows resistance against length extension attack.