[Resource Topic] 2007/240: A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms

Welcome to the resource topic for 2007/240

Title:
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms

Authors: George I. Davida, Jeremy A. Hansen

Abstract:

Cryptographic hash algorithms are important building blocks in cryptographic protocols, providing authentication and assurance of integrity. While many different hash algorithms are available including MD5, Tiger, and HAVAL, it is difficult to compare them since they do not necessarily use the same techniques to achieve their security goals. This work informally describes a framework in four parts which allows different hash algorithms to be compared based on their strengths and weaknesses. By breaking down cryptographic hash algorithms into their preprocessing, postprocessing, compression function, and internal structure components, weaknesses in existing algorithms can be mitigated and new algorithms can take advantage of strong individual components.

ePrint: https://eprint.iacr.org/2007/240

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .