Proposals for iterated hash functions

Lars Ramkilde Knudsen, Søren Steffen Thomsen

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned into constructions of our proposed type.
    Original languageEnglish
    Title of host publicationSECRYPT 2006 : Proceedings of the International Conference on Security and Cryptography
    Place of PublicationSetúbal, Portugal
    PublisherINSTICC
    Publication date2006
    Pages246-253
    ISBN (Print)97-28-86563-5
    Publication statusPublished - 2006
    EventInternational Conference on Security and Cryptography - Setúbal, Portugal
    Duration: 7 Aug 20069 Aug 2006

    Conference

    ConferenceInternational Conference on Security and Cryptography
    Country/TerritoryPortugal
    CitySetúbal
    Period07/08/200609/08/2006

    Keywords

    • Cryptographic hash functions
    • Merkle-Damgard constructions
    • Multi-collisions
    • Birthday attacks

    Fingerprint

    Dive into the research topics of 'Proposals for iterated hash functions'. Together they form a unique fingerprint.

    Cite this