A New Scheme of Blockcipher Hash

被引:3
|
作者
Mazumder, Rashed [1 ]
Miyaji, Atsuko [1 ,2 ,3 ]
机构
[1] JAIST, Nomi 9231292, Japan
[2] Osaka Univ, Grad Sch Engn, 2-2 Yamadaoka, Suita, Osaka 5650871, Japan
[3] Japan Sci & Technol Agcy JST CREST, Kawaguchi, Saitama 3320012, Japan
来源
关键词
cryptographic hash; blockcipher; ideal cipher model; weak cipher model; collision and preimage resistance; IDEAL-CIPHER MODEL; MERKLE-DAMGARD; SECURITY; CONSTRUCTIONS; DM;
D O I
10.1587/transinf.2015ICP0028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cryptographic hash is an important tool in the area of a modern cryptography. It comprises a compression function, where the compression function can be built by a scratch or blockcipher. There are some familiar schemes of blockcipher compression function such as Weimar, Hirose, Tandem, Abreast, Nandi, ISA-09. Interestingly, the security proof of all the mentioned schemes are based on the ideal cipher model (ICM), which depends on ideal environment. Therefore, it is desired to use such a proof technique model, which is close to the real world such as weak cipher model (WCM). Hence, we proposed an (n, 2n) blockcipher compression function, which is secure under the ideal cipher model, weak cipher model and extended weak cipher model (ext. WCM). Additionally, the majority of the existing schemes need multiple key schedules, where the proposed scheme and the Hirose-DM follow single key scheduling property. The efficiency-rate of our scheme is r = 1/2. Moreover, the number of blockcipher call of this scheme is 2 and it runs in parallel.
引用
收藏
页码:796 / 804
页数:9
相关论文
共 50 条
  • [21] New results on the pseudorandomness of some blockcipher constructions
    Gilbert, H
    Minier, M
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 248 - 266
  • [22] A New Hash-Based Enhanced Privacy ID Signature Scheme
    Chen, Liqun
    Dong, Changyu
    El Kassem, Nada
    Newton, Christopher J. P.
    Wang, Yalan
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT I, 2024, 14771 : 37 - 71
  • [23] A new E-cash scheme based on a trapdoor hash function
    Yang, Fuw-Yi
    Chiu, Su-Hui
    Chen, Hung-Yumr
    Advances in Information Sciences and Service Sciences, 2012, 4 (09): : 229 - 237
  • [24] New key management scheme based on pool-hash for WSN and IoT
    Msolli, Amina
    Ajmi, Nader
    Helali, Abdelhamid
    Gassoumi, Abdelaziz
    Maaref, Hassen
    Mghaieth, Ridha
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
  • [25] Building blockcipher from small-block tweakable blockcipher
    Minematsu, Kazuhiko
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 74 (03) : 645 - 663
  • [26] A Multi-User Collaborative Access Control Scheme Based on New Hash Chain
    Wang, Zetian
    Li, Yunfa
    Liu, Guanxu
    Zhang, Di
    ELECTRONICS, 2023, 12 (08)
  • [27] New Enrollment Scheme for Biometric Template using Hash Chaos-Based Cryptography
    Mihailescu, Marius Iulian
    24TH DAAAM INTERNATIONAL SYMPOSIUM ON INTELLIGENT MANUFACTURING AND AUTOMATION, 2013, 2014, 69 : 1459 - 1468
  • [28] Building blockcipher from small-block tweakable blockcipher
    Kazuhiko Minematsu
    Designs, Codes and Cryptography, 2015, 74 : 645 - 663
  • [29] A Scheme to Base a Hash Function on a Block Cipher
    Hirose, Shoichi
    Kuwakado, Hidenori
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 262 - +
  • [30] Developing and testing SCoP - A visual hash scheme
    Maina Olembo, M.
    Kilian, Timo
    Stockhardt, Simon
    Hülsing, Andreas
    Volkamer, Melanie
    Information Management and Computer Security, 2014, 22 (04): : 382 - 392