RUS  ENG
Full version
JOURNALS // Fundamentalnaya i Prikladnaya Matematika // Archive

Fundam. Prikl. Mat., 2009 Volume 15, Issue 5, Pages 171–179 (Mi fpm1250)

This article is cited in 3 papers

The increasing of hash functions security

V. Yu. Levin

M. V. Lomonosov Moscow State University

Abstract: In this paper, we introduce a solution of a data integrity ensuring using cryptographic one-way hash functions. The cryptographical security of such hash functions was estimated by us in detail for different kinds of attacks. We propose a several new schemes of a one-way hash functions security strengthening without reformation of its internal algorithms. Also we outline schemes with the best speed and security level. We show that the Schneier method of suffix superposition has seriously drawback. In this article, we also suggest the method of constructing collision resistant one-way hash functions from standard well-known hash functions. Therefore, the proposed schemas can be used for upgrade majority cryptographic one-way functions, such as MD4, MD5, RIPEMD, SHA, GOST 34 11-94.

UDC: 519.95


 English version:
Journal of Mathematical Sciences (New York), 2011, 172:5, 734–739

Bibliographic databases:


© Steklov Math. Inst. of RAS, 2026