Paper 2012/322

Revisiting Dedicated and Block Cipher based Hash Functions

Anupam Pattanayak

Abstract

A hash function maps a variable length input into a fixed length output. The hash functions that are used in the information security related applications are referred as cryptographic hash functions. Hash functions are being used as building blocks of many complex cryptographic mechanisms and protocols. Construction of a hash function consists of two components. First component is a compression function and the second component is a domain extender. The various hash function design philosophies try to design the compression function from different angles. Two major categories of hash functions are: dedicated hash functions, and block cipher-based hash functions. These two kinds of design philosophies have been revisited in this paper. Two dedicated has functions from MD4 family - MD4, and SHA-256 constructions have been detailed in this paper. To limit the scope of this paper in this framework, discussions on attacks on hash functions, and SHA-3 finalists have been excluded here. Keywords:

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. This manuscript has been submitted for National Workshop on Cryptology 2012, India
Keywords
Hash FunctionMerkle-Damgård DesignMD4SHA-2
Contact author(s)
anupam pk @ gmail com
History
2012-06-12: received
Short URL
https://ia.cr/2012/322
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/322,
      author = {Anupam Pattanayak},
      title = {Revisiting Dedicated and Block Cipher based Hash Functions},
      howpublished = {Cryptology ePrint Archive, Paper 2012/322},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/322}},
      url = {https://eprint.iacr.org/2012/322}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.