Hash Functions Based On Block Ciphers
There are several methods to use a block cipher to build a cryptographic hash function, specifically a one-way compression function.
The methods resemble the block cipher modes of operation usually used for encryption. All well-known hash functions, including MD4, MD5, SHA-1 and SHA-2 are built from block-cipher-like components designed for the purpose, with feedback to ensure that the resulting function is not invertible. SHA-3 finalists included functions with block-cipher-like components (e.g., Skein, BLAKE) though the function finally selected, Keccak, was built on a cryptographic sponge instead.
A standard block cipher such as AES can be used in place of these custom block ciphers; that might be useful when an embedded system needs to implement both encryption and hashing with minimal code size or hardware area. However, that approach can have costs in efficiency and security. The ciphers in hash functions are built for hashing: they use large keys and blocks, can efficiently change keys every block, and have been designed and vetted for resistance to related-key attacks. General-purpose ciphers tend to have different design goals. In particular, AES has key and block sizes that make it nontrivial to use to generate long hash values; AES encryption becomes less efficient when the key changes each block; and related-key attacks make it potentially less secure for use in a hash function than for encryption.
Read more about this topic: Cryptographic Hash Function
Famous quotes containing the words functions, based and/or block:
“Mark the babe
Not long accustomed to this breathing world;
One that hath barely learned to shape a smile,
Though yet irrational of soul, to grasp
With tiny fingerto let fall a tear;
And, as the heavy cloud of sleep dissolves,
To stretch his limbs, bemocking, as might seem,
The outward functions of intelligent man.”
—William Wordsworth (17701850)
“Justice in the hands of the powerful is merely a governing system like any other. Why call it justice? Let us rather call it injustice, but of a sly effective order, based entirely on cruel knowledge of the resistance of the weak, their capacity for pain, humiliation and misery. Injustice sustained at the exact degree of necessary tension to turn the cogs of the huge machine-for- the-making-of-rich-men, without bursting the boiler.”
—Georges Bernanos (18881948)
“No contact with savage Indian tribes has ever daunted me more than the morning I spent with an old lady swathed in woolies who compared herself to a rotten herring encased in a block of ice.”
—Claude Lévi-Strauss (b. 1908)