Proposals for iterated hash functions

Lars Ramkilde Knudsen, Søren Steffen Thomsen

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review


    The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned into constructions of our proposed type.
    Original languageEnglish
    Title of host publicationSECRYPT 2006 : Proceedings of the International Conference on Security and Cryptography
    Place of PublicationSetúbal, Portugal
    Publication date2006
    ISBN (Print)97-28-86563-5
    Publication statusPublished - 2006
    EventInternational Conference on Security and Cryptography - Setúbal, Portugal
    Duration: 7 Aug 20069 Aug 2006


    ConferenceInternational Conference on Security and Cryptography


    • Cryptographic hash functions
    • Merkle-Damgard constructions
    • Multi-collisions
    • Birthday attacks


    Dive into the research topics of 'Proposals for iterated hash functions'. Together they form a unique fingerprint.

    Cite this