Merkle-Damgård construction
GPTKB entity
Statements (55)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
https://www.w3.org/2000/01/rdf-schema#label |
Merkle-Damgård construction
|
gptkbp:input_output |
fixed-size hash value
|
gptkbp:is_adopted_by |
gptkb:financial_institutions
various standards organizations |
gptkbp:is_associated_with |
data integrity
non-repudiation |
gptkbp:is_based_on |
compression function
|
gptkbp:is_characterized_by |
iterative process
|
gptkbp:is_compared_to |
other hash function constructions
|
gptkbp:is_considered_as |
standard model for hash functions
|
gptkbp:is_criticized_for |
vulnerability to certain attacks
performance issues in some applications |
gptkbp:is_defined_by |
input message and initial value
iterative hashing process |
gptkbp:is_described_as |
hashing algorithms
compression and padding mechanisms |
gptkbp:is_evaluated_by |
gptkb:crypt
gptkb:academic_research security analysis |
gptkbp:is_implemented_in |
cryptographic hardware
various cryptographic libraries |
gptkbp:is_influenced_by |
Merkle tree
hash function theory |
gptkbp:is_noted_for |
simplicity and efficiency
|
gptkbp:is_part_of |
cryptographic protocols
information security data protection strategies secure software development cryptographic hash function design |
gptkbp:is_related_to |
gptkb:blockade
encryption techniques digital forensics |
gptkbp:is_subject_to |
ongoing research
|
gptkbp:is_used_in |
gptkb:SHA-256
gptkb:SHA-1 gptkb:MD5 digital signatures secure communications secure transactions cryptographic signatures message authentication codes password hashing |
gptkbp:is_utilized_in |
gptkb:blockchain_technology
identity verification secure storage data verification |
gptkbp:is_vulnerable_to |
length extension attacks
|
gptkbp:named_after |
gptkb:Ralph_Merkle
gptkb:Ivan_Damgård |
gptkbp:provides |
collision resistance
|
gptkbp:requires |
padding scheme
|
gptkbp:used_for |
hash functions
|
gptkbp:bfsParent |
gptkb:SHA-512
|
gptkbp:bfsLayer |
5
|