A Good Hash Function is Hard to Find, and Vice Versa

被引:0
|
作者
Holden, Joshua [1 ,2 ]
机构
[1] Univ Massachusetts, Amherst, MA 01003 USA
[2] Duke Univ, Durham, NC 27706 USA
关键词
course development; hash functions; teaching cryptography; toy ciphers; CRYPTOGRAPHY; ALGORITHM;
D O I
10.1080/01611194.2012.687429
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure hash functions are the unsung heroes of modern cryptography. Introductory courses in cryptography often leave them out; since they do not have a secret key, it is difficult to use hash functions by themselves for cryptography. In addition, most theoretical discussions of cryptographic systems can get by without mentioning them. However, for secure practical implementations of public-key ciphers, digital signatures, and many other systems, they are indispensable. In this article, the author discusses the requirements for a secure hash function and relates his attempts to come up with a toy system which is both reasonably secure and also suitable for students to work with by hand in a classroom setting.
引用
收藏
页码:107 / 119
页数:13
相关论文
共 50 条