Chapter 9 Contents
9 Hash Functions and Data Integrity
9.1 Introduction
9.2 Classification and framework9.2.1 General classification 9.2.2 Basic properties and definitions 9.2.3 Hash properties required for specific applications 9.2.4 One-way functions and compression functions 9.2.5 Relationships between properties 9.2.6 Other hash function properties and applications
9.3 Basic constructions and general results9.3.1 General model for iterated hash functions 9.3.2 General constructions and extensions 9.3.3 Formatting and initialization details 9.3.4 Security objectives and basic attacks 9.3.5 Bitsizes required for practical security
9.4 Unkeyed hash functions (MDCs)9.4.1 Hash functions based on block ciphers 9.4.2 Customized hash functions based on MD4 9.4.3 Hash functions based on modular arithmetic
9.5 Keyed hash functions (MACs)9.5.1 MACs based on block ciphers 9.5.2 Constructing MACs from MDCs 9.5.3 Customized MACs 9.5.4 MACs for stream ciphers
9.6 Data integrity and message authentication9.6.1 Background and definitions 9.6.2 Non-malicious vs. malicious threats to data integrity 9.6.3 Data integrity using a MAC alone 9.6.4 Data integrity using an MDC and an authentic channel 9.6.5 Data integrity combined with encryption
9.7 Advanced attacks on hash functions9.7.1 Birthday attacks 9.7.2 Pseudo-collisions and compression function attacks 9.7.3 Chaining attacks 9.7.4 Attacks based on properties of underlying cipher
9.8 Notes and further references
Return to the Table of contents