Abstract
At Crypto '89 Ivan Damgård [1] presented a method that allows one to construct a computationally collision free hash function that has provably the same level of security as the computationally collision free function with input of constant length that it is based upon. He also gave three examples of collision free functions to use in this construction. For two of these examples collisions have been found[2]
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
I. Damgård, Design Principles for Hash Functions, in Advances in Cryptology: Proceedings of Crypto '89, 416–427, Springer-Verlag,1990.
P. Camion, J. Patarin, The Knapsack Hash Function proposed at Crypto '89 can be broken, Advances in Cryptology-Eurocrypt '91, Proceedings, Springer-Verlag, to appear.
Bert Den Boer, Internal Report RIPE.
S. Wolfram, Random Sequence Generation by Cellular Automata, Advances in Applied Mathematics, 7 (1986) 123–169.
W. Meier, O. Staffelbach, Analysis of Pseudo Random Sequences Generated by Cellular Automata, Advances in Cryptology-Eurocrypt '91, Proceedings, Springer-Verlag, to appear.
R. Merkle, A Fast Software One-Way Hash Function, Journal of Cryptology, 3 (1990) 43–58.
R. Rivest, The MD4 Message Digest Algorithm, Abstracts of Crypto '90, 281–291.
E. Biham, A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Abstracts of Crypto '90, 1–32.
J. Daemen, R. Govaerts, J. Vandewalle, Properties of Partially Linear Cellular Automata, Internal Report ESAT.
Ivan Damgard, personal communication.
I. Verbauwhede and Z. Sahraoui of IMEC (Interuniversitair Micro Electronica Centrum), personal communication.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Daemen, J., Govaerts, R., Vandewalle, J. (1993). A framework for the design of one-way hash functions including cryptanalysis of Damgård's one-way function based on a cellular automaton. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_7
Download citation
DOI: https://doi.org/10.1007/3-540-57332-1_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57332-6
Online ISBN: 978-3-540-48066-2
eBook Packages: Springer Book Archive