Cryptology ePrint Archive: Report 2012/322

Revisiting Dedicated and Block Cipher based Hash Functions

Anupam Pattanayak

Abstract: A hash function maps a variable length input into a fixed length output. The hash functions that are used in the information security related applications are referred as cryptographic hash functions. Hash functions are being used as building blocks of many complex cryptographic mechanisms and protocols. Construction of a hash function consists of two components. First component is a compression function and the second component is a domain extender. The various hash function design philosophies try to design the compression function from different angles. Two major categories of hash functions are: dedicated hash functions, and block cipher-based hash functions. These two kinds of design philosophies have been revisited in this paper. Two dedicated has functions from MD4 family - MD4, and SHA-256 constructions have been detailed in this paper. To limit the scope of this paper in this framework, discussions on attacks on hash functions, and SHA-3 finalists have been excluded here. Keywords:

Category / Keywords: foundations / Hash Function, Merkle-Damgård Design, MD4, SHA-2

Publication Info: This manuscript has been submitted for National Workshop on Cryptology 2012, India

Date: received 6 Jun 2012

Contact author: anupam pk at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20120612:035423 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]