Presentation 2009-12-01
Current Status of A Hash Function
Dai WATANABE,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) A cryptographic hash function has a lot of application such as a digital signature and a message authentication code. Recently, several important breakthroughs have been made in the cryptanalysis against hash functions and they imply that most of the currently used standard hash functions are vulnerable against new attacks. In these circumstances, National Institute of Standards and Technology (NIST) decided to organize Cryptographic Hash Algorithm Competition (SHA-3 competition) and started to call for algorithms. In this document, the known technology of a hash function is surveyed and the current status of the SHA-3 competition is introduced.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Hash function / SHA-3
Paper # IT2009-49
Date of Issue

Conference Information
Committee IT
Conference Date 2009/11/24(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Theory (IT)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Current Status of A Hash Function
Sub Title (in English)
Keyword(1) Hash function
Keyword(2) SHA-3
1st Author's Name Dai WATANABE
1st Author's Affiliation Systems Development Laboratory, Hitachi, Ltd.()
Date 2009-12-01
Paper # IT2009-49
Volume (vol) vol.109
Number (no) 314
Page pp.pp.-
#Pages 6
Date of Issue