1. Encryption Must Move Beyond SHA.
- Author
-
Schneier, Bruce
- Subjects
- *
DATA encryption , *COMPUTER security , *DATA protection , *HASHING , *ELECTRONIC file management , *DATABASE management , *ELECTRONIC data processing , *COMPUTER industry - Abstract
This article describes one-way hash functions, which are a cryptographic construct used in many applications. They are used with public-key algorithms for both encryption and digital signatures, in integrity checking, and in authentication. They have all sorts of applications in different protocols. Much more than encryption algorithms, one-way hash functions are the workhorses of modern cryptography. These functions are supposed to have two properties. They are both one-way and collision-free.
- Published
- 2004