Preliminaries

Jean Philippe Aumasson, Willi Meier, Raphael C.W. Phan, Luca Henzen

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

Abstract

This chapter introduces the reader to cryptographic hash functions, starting with an informal review of the most common applications, from modification detection and digital signature to key update and timestamping. We then present slightly more formally the security notions associated with hash functions, discussing in particular what being “one-way” means (which is less simple than it sounds). Getting more technical, we review state-of-the-art generic collision search methods, and constructions of hash functions. Finally, we conclude with an overview of the SHA1 and SHA2 standards, as well as of the SHA3 finalists.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer
Pages9-35
Number of pages27
DOIs
Publication statusPublished - 2014
Externally publishedYes

Publication series

NameInformation Security and Cryptography
Volume24
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Cite this