Cryptographic HashFunctions
Cryptographic HashFunctions
y and
Network
Security
Sixth Edition
by William Stallings
Chapter 11
Cryptographic Hash Functions
“Each of the messages, like each one he had ever read of Stern's
commands, began with a number and ended with a number or row
of numbers. No efforts on the part of Mungo or any of his experts
had been able to break Stern's code, nor was there any clue as to
what the preliminary number and those ultimate numbers signified.”
Ruth Rendell
“The Douglas Squirrel has a distinctive eating habit. It usually eats
pine cones from the bottom end up. Partially eaten cones can
indicate the presence of these squirrels if they have been attacked
from the bottom first. If, instead, the cone has been eaten from
the top end down, it is more likely to have been a crossbill finch
that has been doing the dining.”
Ruth Rendell
Hash Functions
• A hash function H accepts a variable-length
block of data M as input and produces a fixed-
size hash value
• h = H(M)
• Principal object is data integrity
(Table
can be
found on
page 333
in
textbook
SHA-
512
Logic
Step
Function
s
in SHA-3
Summary
• Applications of • Hash functions
cryptographic hash based on cipher
functions block chaining
• Message
authentication • Secure hash
• Digital signatures algorithm (SHA)
• Other applications • SHA-512 logic
• SHA-512 round
• Requirements and function
security
• SHA-3
• Security requirements
for cryptographic hash • The sponge
functions construction
• Brute-force attacks • The SHA-3
Iteration Function f
• Cryptanalysis