Fast and secure hashing based on codes

被引:0
|
作者
Knudsen, L [1 ]
Preneel, B [1 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, ESAT, B-3001 Heverlee, Belgium
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper considers hash functions based on block ciphers. It presents a new attack on the compression function of the 128-bit hash function MDC-4 using DES with a complexity far less that one would expect, and proposes new constructions of fast and secure compression functions based on error-correcting codes and m-bit block ciphers with an m-bit key. This leads to simple and practical hash function constructions based on block ciphers such as DES, where the key size is slightly smaller than the block size, IDEA, where the key size is twice the block size and to MD4-like hash functions. Under reasonable assumptions about the underlying block cipher, we obtain collision resistant compression functions. Finally we provide examples of hashing constructions based on both DES and IDEA more efficient than previous proposals and discuss applications of our approach for MD4-like hash functions.
引用
收藏
页码:485 / 498
页数:14
相关论文
共 50 条
  • [1] Secure and fast hashing algorithm with multiple security levels
    Elkamchouchi, Hassan M.
    Nasr, Mohammed
    Ismail, Roayat
    Journal of Software, 2009, 4 (09) : 935 - 942
  • [2] Anew secure and fast hashing algorithm (SFHA-256)
    Elkamchouchi, Hassan. M.
    Nasr, Mohamed E.
    Abdelfatah, Roayat Ismail
    PROCEEDINGS OF THE 25TH NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2008, 2008, : U497 - U504
  • [3] Speeding Up the Wide-Pipe: Secure and Fast Hashing
    Nandi, Mridul
    Paul, Souradyuti
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 144 - +
  • [4] Fast Johnson-Lindenstrauss Transform for Robust and Secure Image Hashing
    Lv, Xudong
    Wang, Z. Jane
    2008 IEEE 10TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, VOLS 1 AND 2, 2008, : 729 - 733
  • [5] Not Just for Errors: Codes for Fast and Secure Flash Storage
    Cassuto, Yuval
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1871 - 1875
  • [6] Secure and Fast Digital Signatures using BCH Codes
    Hamdi, Omessaad
    Harari, Sami
    Bouallegue, Ammar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 220 - 226
  • [7] Secure hashing in practice
    German Information Security Agency, P.O. Box 20 03 63, D-53133 Bonn, Germany
    Inf Secur Tech Rep, 4 (53-62):
  • [8] Secure Modular Hashing
    Jimenez, Abelino
    Raj, Bhiksha
    Portelo, Jose
    Trancoso, Isabel
    2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2015,
  • [9] Secure Hashing-Based Verifiable Pattern Matching
    Chen, Fei
    Wang, Donghong
    Li, Ronghua
    Chen, Jianyong
    Ming, Zhong
    Liu, Alex X.
    Duan, Huayi
    Wang, Cong
    Qin, Jing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) : 2677 - 2690
  • [10] Radon Transform-Based Secure Image Hashing
    Nguyen, Dung Q.
    Weng, Li
    Preneel, Bart
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 186 - 193