Abstract
One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the commercial world today. Generating a one-way hash function which is secure if DES is a “good” block cipher would therefore be useful. We show three such functions which are secure if DES is a good random block cipher.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Bibliography
“Secrecy, Authentication, and Public Key Systems”, Stanford Ph.D. thesis, 1979, by Ralph C. Merkle.
“A Certified Digital Signature”, unpublished paper. 1979. To appear in Crypto’ 89.
“Universal One-Way Hash Functions and their Cryptographic Applications”. Moni Naor and Moti Yung. Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, Seattle, Washington May 15–17. 1989. page 33–43.
“A High Speed Manipulation Detection Code”, by Robert R. Jueneman, Advances in Cryptology-CRYPTO’ 86, Springer Verlag. Lecture Notes on Computer Science, Vol. 263. page 327 to 346.
“Another Birthday Attack” by Don Coppersmith, Advances in Cryptology-CRYPTO’ 85. Springer Verlag, Lecture Notes on Computer Science, Vol. 218, pages 14 to 17.
“A digital signature based on a conventional encryption function”. by Ralph C. Merkle, Advances in Cryptology CRYPTO 87, Springer Verlag, Lecture Notes on Computer Science, Vol. 293. page 369–378.
“Cryptography and Data Security”, by Dorothy E. R. Denning. Addison-Wesley 1982. page 170.
“On the security of multiple encryption”. by Ralph C. Merkle. CACM Vol. 24 No. 7, July 1981 pages 465 to 467.
“Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard”. by Martin Hellman et. al., Information Systems lab. report SEL 76-042, Stanford University 1976.
“Communication Theory of Secrecy Systems”, by C. E. Shannon, Bell Sys. Tech. Jour. 28 (Oct. 1949) 656–715
“Message Authentication” by R. R. Jueneman. S. M. Matyas, C. H. Meyer, IEEE Communications Magazine, Vol. 23, No. 9. September 1985 pages 29–40.
“Generating strong one-way functions with cryptographic algorithm”, by S. M. Matyas. C. H. Meyer, and J. Oseas, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A. March 1985 pages 5658–5659
“Analysis of Jueneman’s MDC Scheme”. by Don Coppersmith, preliminary version June 9.1988. Analysis of the system presented in [4].
“The Data Encryption Standard: Past and Future” by M.E. Smid and D.K. Branstad, Proc. of the IEEE, Vol 76 No. 5 pp 550–559, May 1988
“Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information”, U.S. Congress. Office of Technology Assessment OTA-CIT-310, U.S. Government Printing Office, October 1987
“Exhaustive cryptanalysis of the NBS data encryption standard”. Computer, June 1977. pages 74–78
“Cryptograhy: a new dimension in data security”, by Carl H. Meyer and Stephen M. Matyas, Wiley 1982.
“Secure program code with modification detection code”. by Carl H. Meyer and Michael Schilling; Proceedings of the 5th Worldwide Congress on Computers and Communication Security and Protection — SECURICOM 88. pp. 111–130, SEDEP, 8. Rud de la Michodiese, 75002. Paris, France.
“Cryptography — A State of the Art Review,” by Carl H. Meyer, COMEURO 89. Hamburg, May 8–12, 1989. Proceedings-VLSI and Computer Peripherals, 3rd Annual European Computer Conference, pp. 150–154.
“Design Principles for Hash Functions” by Ivan Damgaard. Crypto’ 89.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Merkle, R.C. (1990). One Way Hash Functions and DES. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_40
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_40
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive