Title
Hash Function Based on Block Ciphers
Abstract
Iterated hash functions based on block ciphers are treated. Five attacks on an iterated hash function and on its round function are formulated. The wisdom of strengthening such hash functions by constraining the last block of the message to be hashed is stressed. Schemes for constructing m-bit and 2m-bit hash round functions from m-bit block ciphers are studied. A principle is formalized for evaluating the strength of hash round functions, viz., that applying computationally simple (in both directions) invertible transformations to the input and output of a hash round function yields a new hash round function with the same security. By applying this principle, four attacks on three previously proposed 2m-bit hash round functions are formulated. Finally, three new hash round functions based on an m-bit block cipher with a 2m-bit key are proposed.
Year
DOI
Venue
1992
10.1007/3-540-47555-9_5
Theory and Application of Cryptographic Techniques
Keywords
Field
DocType
last block,hash function,round function,block cipher,hash round function yield,iterated hash function,hash round function,computationally simple,m-bit block cipher,new hash round function
SHA-2,Discrete mathematics,Double hashing,Computer science,Rolling hash,Cryptographic hash function,Algorithm,Theoretical computer science,Hash buster,Hash function,Hash chain,MDC-2
Conference
ISBN
Citations 
PageRank 
3-540-56413-6
110
6.91
References 
Authors
13
2
Search Limit
100110
Name
Order
Citations
PageRank
Xuejia Lai11363259.39
James L. Massey21096272.94