Hashes and Message Digests
Magnus Daum and Hans Dobbertin, Ruhr University Bochum, Germany
Hashing by Iterated Compression
Collisions and Pseudocollisions of the Compression Function
Collision Resistance and the Discrete Log Problem
Compression in MD4-Like Hash Functions
Attacks on MD4-Like Hash Functions
Status of Different Hash Functions
Building Hash Functions from Block Ciphers
INTRODUCTION
Modern asymmetric cryptology started with the invention of digital signatures (see Chapter 176, Digital Signatures and Electronic Signatures) in the mid-1970s, when Diffie and Hellman described properties of suitable mathematical mechanisms. Very shortly later Rivest, Shamir, and Adleman made this idea concrete by introducing their famous RSA scheme (see Chapter 111, Public Key Algorithms). Signing and verification in this scheme uses modular exponentiation, which is useful because of its algebraic properties. Conversely, modular exponentiation is relatively slow when applied to the bit sizes needed for RSA to be secure.
To implement digital signature schemes, in practice one needs an additional cryptographic primitive, a so-called (cryptographic) hash function. A hash algorithm computes an output ...
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.