Security Investigate

Cryptographic Hash Function: An Elevated View

Download now Free registration required

Executive Summary

Information is an important commodity in the world of Electronic communication. To achieve a secure communication between communicating parties, the protection of authenticity and integrity of information is necessary. Cryptographic hash functions play a central role in cryptology. A cryptographic hash function takes an input of arbitrary large size and returns a small fixed size hash value. It satisfies three major cryptographic properties: preimage resistance, second preimage resistance and collision resistance. Due to its cryptographic properties hash function has become an important cryptographic tool which is used to protect information authenticity and integrity. This paper presents a review of cryptographic hash functions.

  • Format: PDF
  • Size: 141.46 KB