This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Cryptographic Hash Standards: Where Do We Go from Here?
March/April 2006 (vol. 4 no. 2)
pp. 88-91
William E. Burr, US National Institute of Standards and Technology
Successful attacks against the two most commonly used cryptographic hash functions, MD5 and SHA-1, have triggered a kind of feeding frenzy in the cryptographic community. Many researchers are now working on hash function attacks, and we can expect new results in this area for the next several years. This article discusses the SHA-1 attack and the US National Institute of Standards and Technology's (NIST's) plans for SHA-1 and hash functions in general.
Index Terms:
hash function, SHA-1, NIST, cryptography, hash function attack
Citation:
William E. Burr, "Cryptographic Hash Standards: Where Do We Go from Here?," IEEE Security & Privacy, vol. 4, no. 2, pp. 88-91, March-April 2006, doi:10.1109/MSP.2006.37
Usage of this product signifies your acceptance of the Terms of Use.