Merkle-Damgård as the Foundation of Hash Cryptography: A Study of Advantages and Limitations
DOI:
https://doi.org/10.58471/ju-ti.v3i01.652Keywords:
Cryptography, Merkle-Damgard, Implementation, Superiority, Python.Abstract
The Merkle-Damgård algorithm is a key foundation in many cryptographic hash functions, including MD5, SHA-1, and SHA-256. This article discusses the working mechanism of the Merkle-Damgård structure, its advantages in maintaining data integrity, as well as the weaknesses that make it vulnerable to certain attacks. The study uses a quantitative approach through simulation and testing of Merkle-Damgård-based hash functions. This structure allows a variable-length input to be converted into a fixed-length hash output through a block-based iterative process and compression function. The results show that this algorithm successfully converts plaintext into a unique hash according to the hashing principle, as shown in both binary and ASCII representations. While effective in many digital security applications, this research highlights the importance of mitigating against potential attacks to improve the security of Merkle-Damgård-based algorithms.
References
Akshima, Guo, S., & Liu, Q. (2022). Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 13509 LNCS, 192–221. https://doi.org/10.1007/978-3-031-15982-4_7
Arif, Z., & Nurokhman, A. (2023). Analisis Perbandingan Algoritma Kriptografi Simetris Dan Asimetris Dalam Meningkatkan Keamanan Sistem Informasi Comparative Analysis of Symmetric and Asymmetric Cryptographic Algorithms in Improving Information System Security. In JTSI (Vol. 4, Issue 2).
Ghanimi, H. M. A., Melgarejo-Bolivar, R. P., Tumi-Figueroa, A., Ray, S., Dadheech, P., & Sengan, S. (2024). Merkle-Damgård hash functions and blockchains: Securing electronic health records. Journal of Discrete Mathematical Sciences and Cryptography, 27(2), 237–248. https://doi.org/10.47974/JDMSC-1878
Haryono, W., Kom, S., & Kom, M. (n.d.). TEORI KRIPTOGRAFI DAN APLIKASI PENERBIT CV.EUREKA MEDIA AKSARA.
Nishitha, T., & Khare, A. (2025). Smart Contract-Enhanced Residual GRU with Merkle-Damgård Cryptography for IoT Attack Detection. Engineering, Technology and Applied Science Research, 15(1), 19331–19336. https://doi.org/10.48084/etasr.8860
Putra, A. E. (n.d.). FUNGSI HASH PADA KRIPTOGRAFI.
Santoso, M. H., Girsang, N. D., Siagian, H., Wahyudi, A., & Sitorus, B. A. (2019). Perbandingan Algoritma Kriptografi Hash MD5 dan SHA-1. In Prosiding Seminar Nasional Teknologi Informatika (Vol. 2).
Sistem Keamanan Informasi. (n.d.).
Sitorus, N., Sharon, J., Sinaga, G., Samosir, S. L., Terapan, S., Rekayasa, T., Lunak, P., & Del, I. T. (2024). Analisis Kinerja Algoritma Hash pada Keamanan Data: Perbandingan Antara SHA-256, SHA-3, dan Blake2. Jurnal Quancom, 2(2).
Prasetyo, B., & Hidayat, R. (2019). Implementasi Algoritma MD5 untuk Integritas Data pada Sistem Keamanan Informasi. Jurnal Sistem Informasi dan Teknologi, 7(3), 123-130. (n.d.).
Rahardjo, B., & Susanto, A. (2017). Penerapan Fungsi Hash dalam Pengamanan Data Transaksi Elektronik. Jurnal Informatika dan Komputer, 10(2), 89-97. (n.d.).
Saputra, A., & Wijaya, D. (2020). Studi Komparasi Algoritma Kriptografi Hash SHA-1, SHA-256, dan MD5. Jurnal Teknologi dan Sistem Informasi, 5(1), 78-85. (n.d.).







