Cryptographic hash functions


Autoria(s): Gauravaram, Praveen; Knudsen, Lars R.
Contribuinte(s)

Stavroulakis, Peter

Stamp, Mark

Data(s)

2010

Resumo

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/81174/

Publicador

Springer

Relação

http://eprints.qut.edu.au/81174/1/chapter.pdf

DOI:10.1007/978-3-642-04117-4_4

Gauravaram, Praveen & Knudsen, Lars R. (2010) Cryptographic hash functions. In Stavroulakis, Peter & Stamp, Mark (Eds.) Handbook of Information and Communication Security. Springer, Heidelberg, pp. 59-79.

Direitos

Copyright 2010 Springer

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Tipo

Book Chapter