Recent contributions to cryptographic hash functions

Jesse Walker, Michael Kounavis, Shay Gueron, Gary Graunke

Research output: Contribution to journalArticlepeer-review

Abstract

Hash functions are cryptography's most widely used primitives, in that they are a fundamental building block used for a wide variety of constructions. The recent attacks of Joux, Wang, and others against the current generation of hash functions has stimulated a resurgence of research into these primitives as well as spawned an international competition, sponsored by the U.S. Government agency, the National Institute of Standards and Technology (NIST), to create a next-generation hash function design. In this article, we provide the background to understand what a hash function is and what problems it addresses. We then describe and contrast two radically different designs entered in the NIST competition, Skein and Vortex. Skein was designed by a team assembled from across the industry and academia, while Vortex was designed exclusively by Intel employees. We next go on to describe the design rationale for each hash function, and we compare and contrast the basic design decisions.
Original languageEnglish
Pages (from-to)80-95
Number of pages16
JournalIntel Technology Journal
Volume13
Issue number2
StatePublished - 1 Jun 2009

Keywords

  • Cryptography
  • Computer security software
  • Data encryption
  • Employees
  • National Institute of Standards & Technology (U.S.)
  • Intel Corp.
  • Block Cipher
  • Cascade Construction
  • Compression Function
  • Hash Function
  • Merkle-Damgård

Fingerprint

Dive into the research topics of 'Recent contributions to cryptographic hash functions'. Together they form a unique fingerprint.

Cite this