Classification of Hash Functions Suitable for Real-Life Systems
スポンサーリンク
概要
- 論文の詳細を見る
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers cannot determine which hash function is most suitable for a particular system. The main reason for this is that the current security classification does not correspond very well to the security requirements of practical systems. This paper describes a new classification which is more suitable for designing real-life systems. This classification is the result of a new qualitative classification and a new quantitative classification. We show a mapping between each class and standard protocols. In addition, we show new requirements for four types of hash function for a future standard.
- (社)電子情報通信学会の論文
- 2008-01-01
著者
-
TANAKA Hidema
National Institute of Information and Communications Technology
-
Yamamura Akihiro
National Institute Of Information And Communications Technology (nict)
-
Yamamura Akihiro
National Institute Of Information And Communications Technology
-
Matsuo Shin'ichiro
Ntt Data Corporation
-
HIRAI Yasumasa
NTT DATA Corporation
-
KUROKAWA Takashi
National Institute of Information and Communications Technology (NICT)
-
Tanaka Hidema
National Inst. Of Information And Communications Technol. Koganei‐shi Jpn
-
Tanaka Hidema
National Institute Of Information And Communications Technology (nict)
関連論文
- Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest
- Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest
- Classification of Hash Functions Suitable for Real-Life Systems
- Efficient Divisible Voting Scheme(Application)(Cryptography and Information Security)
- Graph methods in inverse semigroups(Algorithmic problems in algebra, languages and computation systems)
- Asymmetric secret key ciphers and encrypted data retrieval schemes(Algebras, Languages, Computations and their Applications)
- Changes to Quantum Cryptography
- Linearization Method and Linear Complexity