Mahesh Tripunitara - CERIAS
Students: Spring 2026, unless noted otherwise, sessions will be virtual on Zoom.
The status of some cryptographic hash functions
Jan 30, 1998
Abstract
Cryptographic hash functions play a very important role in security. For instance, they can be used in integrity checking algorithms, bit commitment protocols and constructing digital signatures. In 1989, Damgard proposed a general principle for the construction of cryptographic hash functions. Subsequent to this, Rivest proposed MD2, MD4 and MD5 which are based on Damgard's principles. The federal standard hash function, SHA is also based on Damgard's principles, as is RIPEMD from Europe.In this talk, I will review the principles behind such hash functions. I will also discuss some recent cryptanalytic attacks that have undermined the security of some popular cryptographic hash functions such as MD4 and MD5.
About the Speaker
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List

