Automated design of cryptographic hash schemes by evolving highly-nonlinear functions

被引:0
|
作者
Estevez-Tapiador, Juan M. [1 ]
Hernandez-Castro, Julio C. [1 ]
Peris-Lopez, Pedro [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Carlos III Univ Mad, Dept Comp Sci, Madrid 28911, Spain
关键词
hash function; block cipher; non-linear functions; cryptography and coding; evolutionary computation; information security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last years, a number of serious flaws and vulnerabilities have been found in classic cryptographic hash functions such as MD4 and MD5. More recently, similar attacks have been extended to the widely used SHA-1, to such an extent that nowadays is prudent to switch to schemes such as SHA-256 and Whirlpool. Nevertheless, many cryptographers believe that all the SHA-related schemes could be vulnerable to variants of the same attacks, for all these schemes have been largely influenced by the design of the MD4 hash function. In this paper, we present a general framework for the automated design of cryptographic block ciphers and hash functions by using Genetic Programming. After a characterization of the search space and the fitness function, we evolve highly nonlinear and extremely efficient functions that call be used as the core components of a cryptographic construction. As ail example, a new block cipher named Wheedham is proposed. Following the Miyaguchi-Preneel construction, this block cipher is then used as the compression function of a new hash scheme producing digests of 512 bits. We present a security analysis of our proposal and a comparison in terms of performance with the most promising alternatives in the near future: SHA-512 and Whirlpool. The results show that automatically-obtained schemes such as those presented are competitive both in security and speed.
引用
收藏
页码:1485 / 1504
页数:20
相关论文
共 13 条
  • [1] Automated design of cryptographic hash schemes by evolving highly-nonlinear functions
    Department of Computer Science, Carlos III University of Madrid, 28911 Legones, Madrid, Spain
    [J]. J. Inf. Sci. Eng., 2008, 5 (1485-1504):
  • [2] ON THE DESIGN OF PROVABLY-SECURE CRYPTOGRAPHIC HASH FUNCTIONS
    DESANTIS, A
    YUNG, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 412 - 431
  • [3] A systems theoretic approach to the design of scalable cryptographic hash functions
    Scharinger, Josef
    [J]. COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 10 - 17
  • [4] Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
    Windarta, Susila
    Suryadi, Suryadi
    Ramli, Kalamullah
    Pranggono, Bernardi
    Gunawan, Teddy Surya
    [J]. IEEE ACCESS, 2022, 10 : 82272 - 82294
  • [5] Authentication Schemes from Highly Nonlinear Functions
    Claude Carlet
    Cunsheng Ding
    Harald Niederreiter
    [J]. Designs, Codes and Cryptography, 2006, 40 : 71 - 79
  • [6] Authentication schemes from highly nonlinear functions
    Carlet, Claude
    Ding, Cunsheng
    Niederreiter, Harald
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2006, 40 (01) : 71 - 79
  • [7] Authentication schemes from highly nonlinear functions
    Carlet, Claude
    Ding, Cunsheng
    Niederreiter, Harald
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 739 - +
  • [8] Design of highly-nonlinear horizontal slot waveguide with low and flat dispersion
    Komatsu, Masa-aki
    Saitoh, Kunimasa
    Koshiba, Masanori
    [J]. OPTICS COMMUNICATIONS, 2013, 298 : 180 - 184
  • [9] Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions
    Sadhya, Debanjan
    Singh, Sanjay Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (12) : 15113 - 15137
  • [10] Evaluation and Design of Non-cryptographic Hash Functions for Network Data Stream Algorithms
    Cheng, Guang
    Yan, Yang
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 239 - 244