Hash function competition: security and implementa..., April 2007

Download whole document (PDF) (47.49 KB)

Contents

Metadata

Title
Hash function competition: security and implementation issues
Date
200704
Material Type
Other
Creator/Author
Ferrer, Daniel F., Library Systems
Additional Contributors
Willoughby, Eric, Library Systems, Tang, Chuxia
Copyright
Copyright 2007 by Central Michigan University. Intellectual Property Rights owned by Ferrer, Daniel F., Willoughby, Eric, Tang, Chuxia. This material is copyrighted, and any further reproduction or distribution is prohibited without the permission of the copyright owner.
Subject
Secure Hash Standard Competition; National Institute of Standards and Technology (NIST); Cryptographic hash algorithm; Cryptographic protocols; MD5; SHA-1; Advanced Encryption Standard (AES); National Security Agency/Central Security Service (NSA/CSS); Timing attacks; Cryptosystems; Side channel attacks; Cache-timing attacks; Simple power-analysis attacks (SPA); Differential power analysis (DPA); Hashing (Computer science); Data encryption (Computer science) -- Standards; Cryptography; Computer security;
Description
U.S. Department of Commerce's National Institute of Standards and Technology (NIST) announced the instigation of an effort to develop new cryptographic hash algorithm(s) for the revision of Federal Information Processing Standard (FIPS) 180-2, the Secure Hash Standard. The purpose of this paper was to analyze NIST's hash function competition with regard to security and implementation issues. The current hash functions such as MD5 and SHA-1 are used extensively in security transactions over the Internet. This paper does not propose a new hash algorithm, but reviews the past selection processes and makes recommendation for a change in the process of selecting a new hash function.
Language
English
Select a page in the document viewer.

Text

Text

Comments

Tags