FWF - kryptographische Hashfu - Cryptanalysis of modern cryptographic hash functions II

  • Nad, Tomislav (Co-Investigator (CoI))
  • Mendel, Florian (Co-Investigator (CoI))
  • Schläffer, Martin (Co-Investigator (CoI))
  • Lamberger, Mario (Co-Investigator (CoI))
  • Rijmen, Vincent (Principal Investigator (PI))

Project: Research project

Project Details


The strength of the security of electronic applications and systems relies on the security of the smallest building blocks. Cryptographic hash functions are one example of a ubiquitously deployed building block, with applications ranging from digital signatures, authentication protocols, random number generation and many more. Since the discovery of weaknesses in the most frequently used hash functions in 2005, an extensive amount of work has been invested in hash functions. The SHA-3 competition initiated by NIST in order to find the new standard in hash functions strongly motivates a growing need for fundamental and applied research to support the choice of the new worldwide hash standard. The proposed project wants to investigate in detail the security and foundations of modern hash functions. The first goal of the project is to analyze already established hash functions (e.g. the SHA-2 family, Whirlpool). An important point will be to further generalize the attack methods developed for SHA-1. The second target of the project is to extend the research to recently proposed hash functions within the SHA-3 competition. A third goal is to work towards foundations of hash functions security. It is of utmost importance to advance the state-of-the-art in hash function cryptanalysis and to attain a level of understanding that is comparable to the theory of block cipher cryptanalysis. The Krypto group at IAIK under the lead of Prof. Rijmen has established itself as one of the worlds most active institutions in hash function research. The contributions lie in the range of hash function cryptanalysis as well as hash function design and resulted in numerous publications in conference proceedings and journals. Furthermore, our staff is in charge of the working group on hash functions within the European Network of Excellence ECRYPT II.
Effective start/end date1/02/1031/01/13


Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.