Mahesh Tripunitara - CERIAS

Jan 30, 1998


Cryptographic hash functions play a very important role in security. For instance, they can be used in integrity checking algorithms, bit commitment protocols and constructing digital signatures. In 1989, Damgard proposed a general principle for the construction of cryptographic hash functions. Subsequent to this, Rivest proposed MD2, MD4 and MD5 which are based on Damgard's principles. The federal standard hash function, SHA is also based on Damgard's principles, as is RIPEMD from Europe.

In this talk, I will review the principles behind such hash functions. I will also discuss some recent cryptanalytic attacks that have undermined the security of some popular cryptographic hash functions such as MD4 and MD5.

Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M. STEW G52 (Suite 050B), West Lafayette Campus. More information...

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information