Jump to content

MDC-2

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Melab-1 (talk | contribs) at 19:22, 15 May 2015. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In cryptography, MDC-2 (Modification Detection Code 2, sometimes called Meyer-Schilling) is a cryptographic hash function. MDC-2 is a hash function based on a block cipher with a proof of security in the ideal-cipher model.[1] The length of the output hash depends on the underlying block cipher used.

Algorithm

For a given message to hash and a given block cipher encryption function , the MDC-2 algorithm proceeds as follows. Let be the block length, two different constants of size . If where each has size , then the hash of the message is given by:

  • for to :
  • return

MDC-2DES hashes

When MDC-2 uses the DES block cipher, the 128-bit (16-byte) MDC-2 hashes are typically represented as 32-digit hexadecimal numbers. The following demonstrates a 43-byte ASCII input and the corresponding MDC-2 hash:

 MDC2("The quick brown fox jumps over the lazy dog") 
  = 000ed54e093d61679aefbeae05bfe33a

Even a small change in the message will (with probability) result in a completely different hash, e.g. changing d to c:

 MDC2("The quick brown fox jumps over the lazy cog") 
  = 775f59f8e51aec29c57ac6ab850d58e8

The hash of the zero-length string is:

 MDC2("") 
  = 52525252525252522525252525252525

Patent issues

MDC-2 was covered by U.S. patent 4,908,861, issued on March 13, 1990 but filed by IBM on August 28, 1987.
For this reason, support for MDC-2 has been disabled in OpenSSL on most Linux distributions and is not implemented by many other cryptographic libraries.

But the maximum lifespan of 20 years from filing date means that the U.S. patent 4,908,861 could not have lasted beyond August 28, 2007 ; in fact it has expired in 2002,[2] because IBM has not paid the renewal fee. The same goes for the Canadian patent. There is no patent for Europe. This means that MDC-2 can be freely used.

See also

Notes

  1. ^ Steinberger, John (June 23, 2007). "The Collision Intractability of MDC-2 in the Ideal-Cipher Model". Advances in Cryptology - EUROCRYPT 2007. Springer-Verlag. pp. 34–51. doi:10.1007/978-3-540-72540-4_3. Retrieved January 31, 2008. {{cite conference}}: Unknown parameter |booktitle= ignored (|book-title= suggested) (help)
  2. ^ "USPTO - Patent Maintenance Fees" (Document). United States Patent Office. March 13, 2002. {{cite document}}: Unknown parameter |accessdate= ignored (help); Unknown parameter |url= ignored (help) (Click on "Bibliographic data".)