Cryptographic Hash Functions

Praveen Gauravaram, Lars Ramkilde Knudsen

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

    Abstract

    Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle-Damg{\aa}rd construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1. In the last few years, collision attacks on the MD5 and SHA-1 hash functions have been demonstrated and weaknesses in the Merkle-Damg{\aa}rd construction have been exposed. The impact of these attacks on some important applications has also been analysed. This successful cryptanalysis of the standard hash functions has made National Institute of Standards and Technology (NIST), USA to initiate an international public competition to select the most secure and efficient hash function as the future hash function standard which will be referred to as SHA-3. This chapter studies hash functions. Several approaches to design hash functions are discussed. An overview of the generic attacks and short-cut attacks on the iterated hash functions is provided. Important hash function applications are described. Several hash based MACs are reported. The goals of NIST's SHA-3 competition and its current progress are outlined.
    Original languageEnglish
    Title of host publicationHandbook of Information and Communication Security
    EditorsPeter Stavroulakis, Mark Stamp
    Place of PublicationBerlin Heidelberg
    PublisherSpringer
    Publication date2010
    Edition1
    Pages59-80
    Chapter4
    ISBN (Print)978-3-642-04116-7
    Publication statusPublished - 2010
    SeriesEngineering

    Keywords

    • cryptanalysis
    • SHA-3 hash competition
    • digital signatures
    • Hash functions

    Cite this

    Gauravaram, P., & Knudsen, L. R. (2010). Cryptographic Hash Functions. In P. Stavroulakis, & M. Stamp (Eds.), Handbook of Information and Communication Security (1 ed., pp. 59-80). Springer. Engineering http://www.springer.com/engineering/signals/book/978-3-642-04116-7