Security Properties of Domain Extenders for Cryptographic Hash Functions

  • Andreeva E
  • Mennink B
  • Preneel B
N/ACitations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

— Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most common procedure to extend the domain of a compression function in order to obtain a hash function is a simple linear iteration; however, some variants use multiple iterations or a tree structure that allows for parallelism. This paper presents a survey of 17 extenders in the literature. It considers the natural question whether these preserve the security properties of the compression function, and more in particular collision resistance, second preimage resistance, preimage resistance and the pseudo-random oracle property.

Cite

CITATION STYLE

APA

Andreeva, E., Mennink, B., & Preneel, B. (2010). Security Properties of Domain Extenders for Cryptographic Hash Functions. Journal of Information Processing Systems, 6(4), 453–480. https://doi.org/10.3745/jips.2010.6.4.453

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free