【24h】

Cryptographic Hash Functions: Theory and Practice

机译:加密哈希功能:理论与实践

获取原文

摘要

Cryptographic hash functions are an essential building block for security applications. Until 2005, the amount of theoretical research and cryptanalysis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5. Moreover, serious shortcomings have been identified in the theoretical foundations of existing designs. In response to this hash function crisis, a large number of papers has been published with theoretical results and novel designs. In November 2007, NIST announced the start of the SHA-3 competition, with as goal to select a new hash function family by 2012. About half of the 64 submissions were broken within months. This talk will present an outline of the state of the art of hash functions half-way the competition and attempts to identify open research issues.
机译:加密哈希函数是安全应用程序的基本构建块。直到2005年,投资于本主题的理论研究和密码分析的数量相当有限。从2005年之前发布的百种设计,大约80%的加密分析;这包括广泛使用的散列功能,如MD4和MD5。此外,在现有设计的理论基础上已经确定了严重的缺点。为应对这一哈希功能危机,已经发表了大量论文,并具有理论结果和新颖的设计。 2007年11月,NISS宣布了SHA-3比赛的开始,以至于到2012年选择一个新的哈希函数家族的目标。在几个月内将在64份提交中的大约一半。这次谈判将出示哈希艺术艺术纲要的纲要中的竞争中的竞争和试图确定开放研究问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号