PROPOSALS FOR ITERATED HASH FUNCTIONS

Lars R. Knudsen, Søren S. Thomsen

2006

Abstract

The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned into constructions of our proposed type.

Download


Paper Citation


in Harvard Style

R. Knudsen L. and S. Thomsen S. (2006). PROPOSALS FOR ITERATED HASH FUNCTIONS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 246-253. DOI: 10.5220/0002102102460253

in Bibtex Style

@conference{secrypt06,
author={Lars R. Knudsen and Søren S. Thomsen},
title={PROPOSALS FOR ITERATED HASH FUNCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={246-253},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002102102460253},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - PROPOSALS FOR ITERATED HASH FUNCTIONS
SN - 978-972-8865-63-4
AU - R. Knudsen L.
AU - S. Thomsen S.
PY - 2006
SP - 246
EP - 253
DO - 10.5220/0002102102460253