Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Hash functions: Theory, attacks, and applications

Ilya Mironov

Abstract

We survey theory and applications of cryptographic hash functions, such as MD5 and SHA-1, especially their resistance to collision-finding attacks. We review definitions, design principles, trace genealogy of standard hash functions, discuss generic attacks, attacks on iterative hash functions, and recent attacks on specific functions.

Details

Publication typeTechReport
NumberMSR-TR-2005-187
Pages22
InstitutionMicrosoft Research
> Publications > Hash functions: Theory, attacks, and applications