Determining Minimum Hash Width for Hash Chains

被引:1
|
作者
Dietzfelbinger, Martin [1 ]
Keller, Joerg [2 ]
机构
[1] Tech Univ Ilmenau, Ilmenau, Germany
[2] Fernuniv, Hagen, Germany
关键词
Cryptographic Hash Function; Hash Chain; Tradeoff;
D O I
10.1145/3360664.3360682
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cryptographic hash functions are used in authentication, and repeated application in hash chains is used in communication protocols. In embedded devices, the width of hash values and the associated effort to evaluate the hash function is crucial, and hence the hash values should be as short as possible but should still be sufficient to guarantee the required level of security. We present a new proof for a known result by Flajolet and Odlyzko (Eurocrypt 1989), using only elementary combinatoric and probabilistic arguments. Using this result, we derive a bound on the expected number of hash values still reachable after a given number of steps in the hash chain, so that given any two of the three parameters hash chain length, width of the hash value, and security level, the remaining parameter can be computed. Furthermore, we illustrate how to "refresh" a hash chain to increase the number of reachable hash values if the initial seed is long enough. Based on this, we present a scheme that allows reduced width of hash values, and thus reduced energy consumption in the device, for a hash chain of similar length and similar security level. We illustrate our findings with experiments.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] On Fast Verification of Hash Chains
    Yum, Dae Hyun
    Kim, Jin Seok
    Lee, Pil Joong
    Hong, Sung Je
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 382 - 396
  • [2] Fast verification of hash chains
    Fischlin, M
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 339 - 352
  • [3] Hash chains with diminishing ranges for sensors
    Bradford, PG
    Gavrylyako, OV
    2004 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2004, : 77 - 83
  • [4] Infinite length hash chains and their applications
    Bicakci, K
    Baykal, N
    WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 57 - 61
  • [5] Hash Chains to Secure Proactive Protocols
    Bouabana-Tebibel, Thouraya
    Ayad, Khadidja
    16TH COMMUNICATIONS AND NETWORKING SYMPOSIUM (CNS 2013) - 2013 SPRING SIMULATION MULTI-CONFERENCE (SPRINGSIM'13), 2013, 45 (03): : 62 - 68
  • [6] Self-updating hash chains and their implementations
    Zhang, Haojun
    Zhu, Yuefei
    WEB INFORMATION SYSTEMS - WISE 2006, PROCEEDINGS, 2006, 4255 : 387 - 397
  • [7] Fast Verification of Hash Chains with Reduced Storage
    Yum, Dae Hyun
    Kim, Jin Seok
    Lee, Pil Joong
    Hong, Sung Je
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 383 - 391
  • [8] Fair Micropayment System Based on Hash Chains
    杨宗凯
    郎为民
    谭运猛
    Tsinghua Science and Technology, 2005, (03) : 328 - 333
  • [9] Data Authentication for NDN Using Hash Chains
    Refaei, Tamer
    Horvath, Mark
    Schumaker, Michelle
    Hager, Creighton
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 982 - 987
  • [10] Selective Location Blinding Using Hash Chains
    Lenzini, Gabriele
    Mauw, Sjouke
    Pang, Jun
    SECURITY PROTOCOLS XIX, 2011, 7114 : 132 - +