Recent developments in cryptographic hash functions: Security implications and future directions

  • Authors:
  • Carlos Cid

  • Affiliations:
  • Information Security Group, Royal Holloway, University of London, Egham TW20 0EX, UK

  • Venue:
  • Information Security Tech. Report
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

One of the most important classes of cryptographic algorithms in current use is the class of cryptographic hash functions. Hash functions are ubiquitous in today's IT systems and have a wide range of applications in security protocols and schemes, such as providing software integrity, digital signatures, message authentication and password protection. Among their many security requirements, cryptographic hash function algorithms need to feature a property known as collision resistance, that is, it must be infeasible to construct two distinct inputs with the same hash output. This article provides an overview of cryptographic hash functions and some of the recent developments affecting their security, namely the discovery of efficient methods for constructing collisions for algorithms such as MD5 and SHA-1. We also discuss the many implications of these recent attacks, and the possible directions for the development of the theory of hash functions.