Nothing Special   »   [go: up one dir, main page]

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Special Section on Cryptography and Information Security
Classification of Hash Functions Suitable for Real-Life Systems
The Institute of Electronics, Information and Communication Engineers">Yasumasa HIRAITakashi KUROKAWA The Institute of Electronics, Information and Communication Engineers">Shin'ichiro MATSUO The Institute of Electronics, Information and Communication Engineers">Hidema TANAKAAkihiro YAMAMURA
Author information
Keywords: security, hash function
JOURNAL RESTRICTED ACCESS

2008 Volume E91.A Issue 1 Pages 64-73

Details
Abstract

Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers cannot determine which hash function is most suitable for a particular system. The main reason for this is that the current security classification does not correspond very well to the security requirements of practical systems. This paper describes a new classification which is more suitable for designing real-life systems. This classification is the result of a new qualitative classification and a new quantitative classification. We show a mapping between each class and standard protocols. In addition, we show new requirements for four types of hash function for a future standard.

Content from these authors
© 2008 The Institute of Electronics, Information and Communication Engineers
Previous article Next article
feedback
Top