Affiliation:
1. Mepco Schlenk Engineering College, India
Abstract
Cryptographic Hash Functions are used to achieve a number of Security goals like Message Authentication, Message Integrity, and are also used to implement Digital Signatures (Non-repudiation), and Entity Authentication. This chapter discusses the construction of hash functions and the various attacks on the Hash functions. The Message Authentication Codes are similar to the Hash functions except that they require a key for producing the message digest or hash. Authenticated Encryption is a scheme that combines hashing and Encryption. The Various types of hash functions like one-way hash function, Collision Resistant hash function and Universal hash functions are also discussed in this chapter.
Reference35 articles.
1. Al-Ahmad, M.A., & Alshaikhli, I.F. (2013). Broad view of Cryptographic Hash Functions. International Journal of Computer Science Issues, 10(4).
2. Bellare, M., Canetti, R., & Krawczyk, H. (1996a). Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. Proceedings of FOCS (pp. 514-523).
3. Bellare, M., Canetti, R., & Krawczyk, H. (1996b). Keying Hash Functions for Message Authentication. Proceedings of CRYPTO ’96 (pp. 1-15).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献