This is the archived website of SI 486H from the Spring 2016 semester. Feel free to browse around; you may also find more recent offerings at my teaching page.

Problem 79

Learn about a crypto hash

Due: April 12
Points: 1-2

Look up a hash function that is considered cryptographically secure, such as MD5, SHA-1, SHA-256, Skein, or Keccak.

Using at least two sources that you document, tell me about the most interesting features of this hash function, such as:

  • Is it actually used in practice? If so, where?
  • Is this hash function still considered secure? Have there been any successful "attacks" against it?
  • How does it compare to Carter & Wegman hash functions in terms of speed?

Finally, find an implementation of your hash function somewhere, compute the hash of your last name, and write that down.

1 point bonus if you learn about a hash function that no one else picks.