The status of some cryptographic hash functions
Mahesh Tripunitara - CERIAS
Jan 30, 1998
AbstractCryptographic hash functions play a very important role in security. For instance, they can be used in integrity checking algorithms, bit commitment protocols and constructing digital signatures. In 1989, Damgard proposed a general principle for the construction of cryptographic hash functions. Subsequent to this, Rivest proposed MD2, MD4 and MD5 which are based on Damgard's principles. The federal standard hash function, SHA is also based on Damgard's principles, as is RIPEMD from Europe.
In this talk, I will review the principles behind such hash functions. I will also discuss some recent cryptanalytic attacks that have undermined the security of some popular cryptographic hash functions such as MD4 and MD5.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.