Authors:
Emmanouel Kellinis
1
and
Konstantinos Papapanagiotou
2
Affiliations:
1
KPMG LLP, One Canada Square, United Kingdom
;
2
University of Athens, Greece
Keyword(s):
Hash function, steganography, source code tampering.
Related
Ontology
Subjects/Areas/Topics:
Data Engineering
;
Data Integrity
;
Databases and Data Security
;
Information and Systems Security
;
Information Assurance
;
Information Hiding
Abstract:
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash function has become imperative. Even though many solutions have been proposed as replacements, the transition to a new function could be costly and complex. In this paper, we introduce a mode of operation that can be applied to any existing or future hash function in order to improve its collision resistance. In particular, we use steganography, the art of hiding a message into another message, to create a scheme, named Σ-Hash, which enforces the security of hashing algorithms. We will demonstrate how, apart from hash function security, Σ-Hash can also be used for securing Open Source code from tampering attacks and other applications.