Cryptology ePrint Archive: Report 2007/240
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
George I. Davida and Jeremy A. Hansen
Abstract: Cryptographic hash algorithms are important building blocks in cryptographic protocols, providing authentication and assurance of integrity. While many different hash algorithms are available including MD5, Tiger, and HAVAL, it is difficult to compare them since they do not
necessarily use the same techniques to achieve their security goals. This work informally describes a framework in four parts which allows different hash algorithms to be compared based on their strengths and weaknesses. By breaking down cryptographic hash algorithms into their preprocessing, postprocessing, compression function, and internal structure components, weaknesses in existing algorithms can be mitigated and new algorithms can take advantage of strong individual components.
Category / Keywords: cryptographic protocols / Hash functions
Date: received 16 Jun 2007
Contact author: jahansen at uwm edu
Available format(s): PDF | BibTeX Citation
Note: A work in progress: feedback very welcome.
Version: 20070619:200113 (All versions of this report)
Short URL: ia.cr/2007/240
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]