Mahesh Tripunitara - CERIAS
Students: Fall 2024, unless noted otherwise, sessions will be virtual on Zoom.
The status of some cryptographic hash functions
Jan 30, 1998
Abstract
Cryptographic hash functions play a very important role in security. For instance, they can be used in integrity checking algorithms, bit commitment protocols and constructing digital signatures. In 1989, Damgard proposed a general principle for the construction of cryptographic hash functions. Subsequent to this, Rivest proposed MD2, MD4 and MD5 which are based on Damgard's principles. The federal standard hash function, SHA is also based on Damgard's principles, as is RIPEMD from Europe.In this talk, I will review the principles behind such hash functions. I will also discuss some recent cryptanalytic attacks that have undermined the security of some popular cryptographic hash functions such as MD4 and MD5.