New Approaches for Building Cryptographic Hash Functions

Cryptographic hash functions are a fundamental primitive, utilized in numerous security applications. With the recent attacks against many widely deployed hash functions (e.g., MD5, SHA-1), the search is on for new, secure hash functions to re-establish security of all the various protocols that rely on them. At the same time, hash functions like SHA-1 have seen expanded usage into applications that demand security properties not handled by traditional design approaches. In this talk, I’ll discuss the traditional design setting for hash functions, investigate the insufficiency of proposed design approaches, and introduce our new approach, which enables building a single hash function with strong security guarantees for multiple applications. Beyond the traditional design setting, there exists another in which hash functions have dedicated-keys. I’ll highlight some of the benefits and downsides of working in this setting and, as before, propose approaches for this setting that allow building hash functions secure in a broad sense.

Joint work with Mihir Bellare

Speaker Details

Thomas Ristenpart is currently a PhD student at UC San Diego in the computer security and cryptography research group. He is advised by Mihir Bellare. He received his Masters in Computer Science from UC Davis in 2005 and his Bachelors in Computer Science and Engineering from UC Davis in 2003. His research focuses on computer security and cryptography, with recent projects including the design of fundamental cryptographic primitives such as ciphers and hash functions, practical solutions to improving the security of multi-party cryptographic protocols, and techniques for automatic removal of malware from computer systems.

Date:
Speakers:
Tom Ristenpart
Affiliation:
UCSD
    • Portrait of Jeff Running

      Jeff Running