— Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most common procedure to extend the domain of a compression function in order to obtain a hash function is a simple linear iteration; however, some variants use multiple iterations or a tree structure that allows for parallelism. This paper presents a survey of 17 extenders in the literature. It considers the natural question whether these preserve the security properties of the compression function, and more in particular collision resistance, second preimage resistance, preimage resistance and the pseudo-random oracle property.
CITATION STYLE
Andreeva, E., Mennink, B., & Preneel, B. (2010). Security Properties of Domain Extenders for Cryptographic Hash Functions. Journal of Information Processing Systems, 6(4), 453–480. https://doi.org/10.3745/jips.2010.6.4.453
Mendeley helps you to discover research relevant for your work.