Chapter 9 Contents
9 Hash Functions and Data Integrity
9.1 Introduction
9.2 Classification and framework
9.2.1 General classification
9.2.2 Basic properties and definitions
9.2.3 Hash properties required for specific applications
9.2.4 One-way functions and compression functions
9.2.5 Relationships between properties
9.2.6 Other hash function properties and applications
9.3 Basic constructions and general results
9.3.1 General model for iterated hash functions
9.3.2 General constructions and extensions
9.3.3 Formatting and initialization details
9.3.4 Security objectives and basic attacks
9.3.5 Bitsizes required for practical security
9.4 Unkeyed hash functions (MDCs)
9.4.1 Hash functions based on block ciphers
9.4.2 Customized hash functions based on MD4
9.4.3 Hash functions based on modular arithmetic
9.5 Keyed hash functions (MACs)
9.5.1 MACs based on block ciphers
9.5.2 Constructing MACs from MDCs
9.5.3 Customized MACs
9.5.4 MACs for stream ciphers
9.6 Data integrity and message authentication
9.6.1 Background and definitions
9.6.2 Non-malicious vs. malicious threats to data integrity
9.6.3 Data integrity using a MAC alone
9.6.4 Data integrity using an MDC and an authentic channel
9.6.5 Data integrity combined with encryption
9.7 Advanced attacks on hash functions
9.7.1 Birthday attacks
9.7.2 Pseudo-collisions and compression function attacks
9.7.3 Chaining attacks
9.7.4 Attacks based on properties of underlying cipher
9.8 Notes and further references
Return to the Table of contents