Cryptographic hash functions had been very significant primitives to the cryptography. They have been utilized widely in cryptographic applications and most important of them is their use in the composition of efficient Message Authentication Codes (MACs). The cryptanalysis of hashing algorithms used in Hash Message Authentication Code(HMAC) like SHA-1 and MD5 have found many attacks against them [5], [6], [7], [8]. But this does not mean that if the underlying hashing algorithms are breakable then HMAC is also breakable. It is infeasible for the attacker to break HMAC because he would not be able to generate message sets offline without predicting the key K. The goal of this paper is to improve the strength of Hash Message Authentication Code (HMAC), so that its resistance increases to the Birthday Attack and Exhaustive key Search Attack. The secret key used in calculation of HMAC is shared among the sender and the recipient. We generated the Secret key with the help of a pseudorandom MD6 hashing function so that it becomes more secure and hard to envisage by forgery.
[1]
Hugo Krawczyk,et al.
Keying Hash Functions for Message Authentication
,
1996,
CRYPTO.
[2]
Xiaoyun Wang,et al.
How to Break MD5 and Other Hash Functions
,
2005,
EUROCRYPT.
[3]
Christopher Yale Crutchfield.
Security Proofs for the MD6 Hash Function Mode of Operation
,
2008
.
[4]
William Stallings,et al.
Cryptography and Network Security: Principles and Practice
,
1998
.
[5]
Mohannad Najjar,et al.
d-HMAC Dynamic HMAC function
,
2006,
2006 International Conference on Dependability of Computer Systems.
[6]
Antoon Bosselaers,et al.
Collisions for the Compressin Function of MD5
,
1994,
EUROCRYPT.