Abstract
Recent years have witnessed an exceptional research interest in
cryptographic hash functions, especially after the popular attacks against
MD5 and SHA-1 in 2005. In 2007, the U.S. National Institute of Standards
and Technology (NIST) has also significantly boosted this interest by
announcing a public competition to select the next hash function standard,
to be named SHA-3. Not surprisingly, the hash function literature has
since been rapidly growing in an extremely fast pace. In this paper, we
provide a comprehensive, up-to-date discussion of the current state of the
art of cryptographic hash functions security and design. We first discuss
the various hash functions security properties and notions, then proceed
to give an overview of how (and why) hash functions evolved over the years
giving raise to the current diverse hash functions design approaches
Original language | English |
---|---|
Title of host publication | Short Paper Proceedings of 6th China International Conference on Information Security and Cryptology (Inscrypt '10) |
Publisher | Science Press of China |
Pages | 133-150 |
Number of pages | 18 |
Publication status | Published - 2010 |