Determining Minimum Hash Width for Hash Chains

被引:1
|
作者
Dietzfelbinger, Martin [1 ]
Keller, Joerg [2 ]
机构
[1] Tech Univ Ilmenau, Ilmenau, Germany
[2] Fernuniv, Hagen, Germany
关键词
Cryptographic Hash Function; Hash Chain; Tradeoff;
D O I
10.1145/3360664.3360682
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cryptographic hash functions are used in authentication, and repeated application in hash chains is used in communication protocols. In embedded devices, the width of hash values and the associated effort to evaluate the hash function is crucial, and hence the hash values should be as short as possible but should still be sufficient to guarantee the required level of security. We present a new proof for a known result by Flajolet and Odlyzko (Eurocrypt 1989), using only elementary combinatoric and probabilistic arguments. Using this result, we derive a bound on the expected number of hash values still reachable after a given number of steps in the hash chain, so that given any two of the three parameters hash chain length, width of the hash value, and security level, the remaining parameter can be computed. Furthermore, we illustrate how to "refresh" a hash chain to increase the number of reachable hash values if the initial seed is long enough. Based on this, we present a scheme that allows reduced width of hash values, and thus reduced energy consumption in the device, for a hash chain of similar length and similar security level. We illustrate our findings with experiments.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] One-Time Password Authentication with Infinite Hash Chains
    Chefranov, Alexander G.
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 283 - 286
  • [42] Anonymous incentive protocol for MANET routing based on Hash chains
    Zhong, Yuan
    Hao, Jianguo
    Dai, Yiqi
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2012, 52 (03): : 390 - 394
  • [43] On the Design of Special Hash Functions for Multiple Hash Tables
    Serrano, Eleazar Jimenez
    2012 9TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2012,
  • [44] Hash Hash-1并行Join算法
    金志权
    葛芝宾
    陈佩佩
    谢立
    计算机研究与发展, 1997, (S1) : 76 - 80
  • [45] Hash-One: a lightweight cryptographic hash function
    Mukundan, Puliparambil Megha
    Manayankath, Sindhu
    Srinivasan, Chungath
    Sethumadhavan, Madathil
    IET INFORMATION SECURITY, 2016, 10 (05) : 225 - 231
  • [46] Universal hash functions for an infinite universe and hash trees
    Brass, Peter
    INFORMATION PROCESSING LETTERS, 2009, 109 (10) : 461 - 462
  • [47] Hash function vulnerability index and hash chain attacks
    Lee, David
    2007 3RD IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2007, : 1 - 6
  • [48] Deep hash: semantic similarity preserved hash scheme
    Feng, Weiguo
    Jia, Baozhi
    Zhu, Ming
    ELECTRONICS LETTERS, 2014, 50 (19) : 1347 - 1348
  • [49] HASH AND REHASH
    不详
    JOURNAL OF ECONOMIC ENTOMOLOGY, 1946, 39 (05) : 679 - 680
  • [50] Hash functions
    Jenkins, B
    DR DOBBS JOURNAL, 1997, 22 (09): : 107 - +