Security

Provable Security of BLAKE With Non-Ideal Compression Function

Download Now Free registration required

Executive Summary

Hash functions are a main building block for numerous cryptographic applications. Due to a series of attacks on the widely deployed SHA-1 hash function by Wang et al., the US National Institute for Standards and Technology (NIST) recommended the replacement of SHA-1 by the SHA-2 hash function family and announced a call for the design of a new SHA-3 hashing algorithm in 2007. Evaluating the security and performance of the remaining five candidates is crucial in the ongoing process for the selection of the finalist hash function.

  • Format: PDF
  • Size: 461.44 KB