Skip to main content

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 335))

  • 1288 Accesses

Abstract

Distributed Computing and Network Communication has revolutionized the face of modern computing. But this includes serious security concerns like verifying the integrity and authenticity of the transmitted data. The sender and the receiver communicating over an insecure channel essentially require a method by which the information transmitted by the sender can be easily authenticated by the receiver as “unmodified” (authentic). Techniques such as Encryption can protect against passive attacks like eavesdropping but for active attack like falsification of data, Message Authentication Code (MAC) is needed. A modern technique that relies on a related family of functions called Hash Functions provides message authentication. Cryptographic Hash Functions have many applications such as Digital Signatures, Time Stamping Methods and File Modification Detection Methods. MD6 is one such modern well-known cryptographic hash function. In the subsequent sections we shall analyze the software implementation of MD6 and its performance in various scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stallings, W.: Cryptography and Network Security (Principles and Practices), 5th edn., p. 624, pp. 638–640, 642–644

    Google Scholar 

  2. Rivest, R.L., Agre, B., Bailey, D.V., Crutchfield, C., Dodis, Y., Elliott, K., Khan, F.A., Krishnamurthy, J., Lin, Y., Reyzin, L., Shen, E., Sukha, J., Sutherland, D., Tromer, E., Yin, Y.L.: The MD6 hash function: A proposal to NIST for SHA-3 (2008)

    Google Scholar 

  3. Christopher Yale Crutchfield, B.S.: Electrical Engineering and Computer Science (2006)

    Google Scholar 

  4. Heilman, E.: Restoring the Differential Resistance of MD6 (2001), http://eprint.iacr.org/2011/374

  5. Schneier on Security, http://www.schneier.com/blog/archives/2009/07/md6.html

  6. Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chowdhury, A., Ray, U.K. (2012). Implementation of MD6. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34135-9_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34134-2

  • Online ISBN: 978-3-642-34135-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics