DocumentCode :
898935
Title :
Cryptographic hash standards: where do we go from here?
Author :
Burr, William E.
Author_Institution :
US Nat. Inst. of Stand. & Technol., Gaithersburg, MD
Volume :
4
Issue :
2
fYear :
2006
Firstpage :
88
Lastpage :
91
Abstract :
Successful attacks against the two most commonly used cryptographic hash functions, MD5 and SHA-1, have triggered a kind of feeding frenzy in the cryptographic community. Many researchers are now working on hash function attacks, and we can expect new results in this area for the next several years. This article discusses the SHA-1 attack and the US National Institute of Standards and Technology´s (NIST´s) plans for SHA-1 and hash functions in general
Keywords :
cryptography; standards; MD5; SHA-1 attack; US National Institute of Standards and Technology; cryptographic hash function attacks; cryptographic hash standards; Application software; Certification; Computer security; Cryptography; Digital signatures; History; NIST; Operating systems; Privacy; Standards publication; NIST; SHA-1; cryptography; hash function; hash function attack;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2006.37
Filename :
1621069
Link To Document :
بازگشت