On the Use of Cryptographic Dedicated Hash Functions for Digital Signatures
Uloženo v:
| Název: | On the Use of Cryptographic Dedicated Hash Functions for Digital Signatures |
|---|---|
| Autoři: | Akram A. M. Naji, Yahya Abuhasan |
| Přispěvatelé: | The Pennsylvania State University CiteSeerX Archives |
| Zdroj: | http://www.mat.usm.my/research/onlineproc/cs07.pdf. |
| Sbírka: | CiteSeerX |
| Témata: | literature, hashcode, hash total, hash result, imprint, checksum, compression, compressed encoding, seal, authenticator, authentication tag, fingerprint, test key, condensation, Message Integrity Code (MIC, message digest, etc [21]. They are an important block |
| Popis: | Cryptographic hash functions are an important building block for a wide range of applications such as digital signatures. In this paper, we give an overview of cryptographic hash functions; classification, definitions, and their basic security. We give special emphasis on cryptographic dedicated hash functions with summarizing the recent attacks on MD5 and SHA-1. Finally, we discuss the design and security of the hash functions SHA-family. Key words and phrases: hash functions, digital signature, dedicated hash functions 1. |
| Druh dokumentu: | text |
| Popis souboru: | application/pdf |
| Jazyk: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317; http://www.mat.usm.my/research/onlineproc/cs07.pdf |
| Dostupnost: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317 http://www.mat.usm.my/research/onlineproc/cs07.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Přístupové číslo: | edsbas.AB6FC3C8 |
| Databáze: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Naji%20AAM Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.AB6FC3C8 RelevancyScore: 750 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 750 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: On the Use of Cryptographic Dedicated Hash Functions for Digital Signatures – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Akram+A%2E+M%2E+Naji%22">Akram A. M. Naji</searchLink><br /><searchLink fieldCode="AR" term="%22Yahya+Abuhasan%22">Yahya Abuhasan</searchLink> – Name: Author Label: Contributors Group: Au Data: The Pennsylvania State University CiteSeerX Archives – Name: TitleSource Label: Source Group: Src Data: <i>http://www.mat.usm.my/research/onlineproc/cs07.pdf</i>. – Name: Subset Label: Collection Group: HoldingsInfo Data: CiteSeerX – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22literature%22">literature</searchLink><br /><searchLink fieldCode="DE" term="%22hashcode%22">hashcode</searchLink><br /><searchLink fieldCode="DE" term="%22hash+total%22">hash total</searchLink><br /><searchLink fieldCode="DE" term="%22hash+result%22">hash result</searchLink><br /><searchLink fieldCode="DE" term="%22imprint%22">imprint</searchLink><br /><searchLink fieldCode="DE" term="%22checksum%22">checksum</searchLink><br /><searchLink fieldCode="DE" term="%22compression%22">compression</searchLink><br /><searchLink fieldCode="DE" term="%22compressed+encoding%22">compressed encoding</searchLink><br /><searchLink fieldCode="DE" term="%22seal%22">seal</searchLink><br /><searchLink fieldCode="DE" term="%22authenticator%22">authenticator</searchLink><br /><searchLink fieldCode="DE" term="%22authentication+tag%22">authentication tag</searchLink><br /><searchLink fieldCode="DE" term="%22fingerprint%22">fingerprint</searchLink><br /><searchLink fieldCode="DE" term="%22test+key%22">test key</searchLink><br /><searchLink fieldCode="DE" term="%22condensation%22">condensation</searchLink><br /><searchLink fieldCode="DE" term="%22Message+Integrity+Code+%28MIC%22">Message Integrity Code (MIC</searchLink><br /><searchLink fieldCode="DE" term="%22message+digest%22">message digest</searchLink><br /><searchLink fieldCode="DE" term="%22etc+[21]%2E+They+are+an+important+block%22">etc [21]. They are an important block</searchLink> – Name: Abstract Label: Description Group: Ab Data: Cryptographic hash functions are an important building block for a wide range of applications such as digital signatures. In this paper, we give an overview of cryptographic hash functions; classification, definitions, and their basic security. We give special emphasis on cryptographic dedicated hash functions with summarizing the recent attacks on MD5 and SHA-1. Finally, we discuss the design and security of the hash functions SHA-family. Key words and phrases: hash functions, digital signature, dedicated hash functions 1. – Name: TypeDocument Label: Document Type Group: TypDoc Data: text – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317; http://www.mat.usm.my/research/onlineproc/cs07.pdf – Name: URL Label: Availability Group: URL Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317<br />http://www.mat.usm.my/research/onlineproc/cs07.pdf – Name: Copyright Label: Rights Group: Cpyrght Data: Metadata may be used without restrictions as long as the oai identifier remains attached to it. – Name: AN Label: Accession Number Group: ID Data: edsbas.AB6FC3C8 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.AB6FC3C8 |
| RecordInfo | BibRecord: BibEntity: Languages: – Text: English Subjects: – SubjectFull: literature Type: general – SubjectFull: hashcode Type: general – SubjectFull: hash total Type: general – SubjectFull: hash result Type: general – SubjectFull: imprint Type: general – SubjectFull: checksum Type: general – SubjectFull: compression Type: general – SubjectFull: compressed encoding Type: general – SubjectFull: seal Type: general – SubjectFull: authenticator Type: general – SubjectFull: authentication tag Type: general – SubjectFull: fingerprint Type: general – SubjectFull: test key Type: general – SubjectFull: condensation Type: general – SubjectFull: Message Integrity Code (MIC Type: general – SubjectFull: message digest Type: general – SubjectFull: etc [21]. They are an important block Type: general Titles: – TitleFull: On the Use of Cryptographic Dedicated Hash Functions for Digital Signatures Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Akram A. M. Naji – PersonEntity: Name: NameFull: Yahya Abuhasan – PersonEntity: Name: NameFull: The Pennsylvania State University CiteSeerX Archives IsPartOfRelationships: – BibEntity: Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: http://www.mat.usm.my/research/onlineproc/cs07.pdf Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science