TY - CHAP
T1 - Preliminaries
AU - Aumasson, Jean Philippe
AU - Meier, Willi
AU - Phan, Raphael C.W.
AU - Henzen, Luca
N1 - Publisher Copyright:
© 2014, Springer-Verlag Berlin Heidelberg.
Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2014
Y1 - 2014
N2 - This chapter introduces the reader to cryptographic hash functions, starting with an informal review of the most common applications, from modification detection and digital signature to key update and timestamping. We then present slightly more formally the security notions associated with hash functions, discussing in particular what being “one-way” means (which is less simple than it sounds). Getting more technical, we review state-of-the-art generic collision search methods, and constructions of hash functions. Finally, we conclude with an overview of the SHA1 and SHA2 standards, as well as of the SHA3 finalists.
AB - This chapter introduces the reader to cryptographic hash functions, starting with an informal review of the most common applications, from modification detection and digital signature to key update and timestamping. We then present slightly more formally the security notions associated with hash functions, discussing in particular what being “one-way” means (which is less simple than it sounds). Getting more technical, we review state-of-the-art generic collision search methods, and constructions of hash functions. Finally, we conclude with an overview of the SHA1 and SHA2 standards, as well as of the SHA3 finalists.
UR - http://www.scopus.com/inward/record.url?scp=85019712820&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-44757-4_2
DO - 10.1007/978-3-662-44757-4_2
M3 - Chapter (Book)
AN - SCOPUS:85019712820
T3 - Information Security and Cryptography
SP - 9
EP - 35
BT - Information Security and Cryptography
PB - Springer
ER -