Hash Functions Technical Report
Hash Functions Technical Report
Hash Functions
Mustafa Alper BALIM 1 and Ismail Butun 2
I. INTRODUCTION
A hash input x of arbitrary finite length is divided into fixedlength r-bit blocks xi. This preprocessing typically involves
appending extra bits (padding) as necessary to attain an overall
bit length which is a multiple of the block length r.
Data integrity is the property whereby data has not been altered
in an unauthorized manner since the time it was created,
transmitted, or stored by an authorized source.
Data origin authentication is a type of authentication whereby a
party is corroborated as the (original) source of specified data
ACKNOWLEDGMENT
[1]
[2]
A. Birthday attacks
Algorithm-independent attacks are those which can be applied
to any hash function, treating it as a black-box whose only
significant characteristics are the output bit length n (andMAC
key bit length for MACs), and the running time for one hash
operation. It is typically assumed the hash output approximates
a uniform random variable.