Abstract

We survey theory and applications of cryptographic hash functions, such as MD5 and SHA-1, especially their resistance to collision-finding attacks. We review definitions, design principles, trace genealogy of standard hash functions, discuss generic attacks, attacks on iterative hash functions, and recent attacks on specific functions.