The security of electronic applications depends on the security of the underlying cryptographic components. Cryptographic hash functions are one type of components. A popular hash function is SHA-1, which was designed by the NSA. Recent developments in cryptanalysis have cast doubts on the security of hash functions in general, and SHA-1 in particular.
In this project want to investigate in detail the security of commonly used hash functions. The first goal of the project is to demonstrate weaknesses in the hash function SHA-1, world wide the most used hash function. The second goal of the project is to extend the research to recently proposed alternative hash functions. The third goal is to come up with an own design.