Cryptographic hash functions
Contribuinte(s) |
Stavroulakis, Peter Stamp, Mark |
---|---|
Data(s) |
2010
|
Resumo |
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer |
Relação |
http://eprints.qut.edu.au/81174/1/chapter.pdf DOI:10.1007/978-3-642-04117-4_4 Gauravaram, Praveen & Knudsen, Lars R. (2010) Cryptographic hash functions. In Stavroulakis, Peter & Stamp, Mark (Eds.) Handbook of Information and Communication Security. Springer, Heidelberg, pp. 59-79. |
Direitos |
Copyright 2010 Springer |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Tipo |
Book Chapter |