Abstract
Distributed Computing and Network Communication has revolutionized the face of modern computing. But this includes serious security concerns like verifying the integrity and authenticity of the transmitted data. The sender and the receiver communicating over an insecure channel essentially require a method by which the information transmitted by the sender can be easily authenticated by the receiver as “unmodified” (authentic). Techniques such as Encryption can protect against passive attacks like eavesdropping but for active attack like falsification of data, Message Authentication Code (MAC) is needed. A modern technique that relies on a related family of functions called Hash Functions provides message authentication. Cryptographic Hash Functions have many applications such as Digital Signatures, Time Stamping Methods and File Modification Detection Methods. MD6 is one such modern well-known cryptographic hash function. In the subsequent sections we shall analyze the software implementation of MD6 and its performance in various scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Stallings, W.: Cryptography and Network Security (Principles and Practices), 5th edn., p. 624, pp. 638–640, 642–644
Rivest, R.L., Agre, B., Bailey, D.V., Crutchfield, C., Dodis, Y., Elliott, K., Khan, F.A., Krishnamurthy, J., Lin, Y., Reyzin, L., Shen, E., Sukha, J., Sutherland, D., Tromer, E., Yin, Y.L.: The MD6 hash function: A proposal to NIST for SHA-3 (2008)
Christopher Yale Crutchfield, B.S.: Electrical Engineering and Computer Science (2006)
Heilman, E.: Restoring the Differential Resistance of MD6 (2001), http://eprint.iacr.org/2011/374
Schneier on Security, http://www.schneier.com/blog/archives/2009/07/md6.html
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chowdhury, A., Ray, U.K. (2012). Implementation of MD6. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-34135-9_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34134-2
Online ISBN: 978-3-642-34135-9
eBook Packages: Computer ScienceComputer Science (R0)