A New Scheme of Blockcipher Hash

被引:3
|
作者
Mazumder, Rashed [1 ]
Miyaji, Atsuko [1 ,2 ,3 ]
机构
[1] JAIST, Nomi 9231292, Japan
[2] Osaka Univ, Grad Sch Engn, 2-2 Yamadaoka, Suita, Osaka 5650871, Japan
[3] Japan Sci & Technol Agcy JST CREST, Kawaguchi, Saitama 3320012, Japan
来源
关键词
cryptographic hash; blockcipher; ideal cipher model; weak cipher model; collision and preimage resistance; IDEAL-CIPHER MODEL; MERKLE-DAMGARD; SECURITY; CONSTRUCTIONS; DM;
D O I
10.1587/transinf.2015ICP0028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cryptographic hash is an important tool in the area of a modern cryptography. It comprises a compression function, where the compression function can be built by a scratch or blockcipher. There are some familiar schemes of blockcipher compression function such as Weimar, Hirose, Tandem, Abreast, Nandi, ISA-09. Interestingly, the security proof of all the mentioned schemes are based on the ideal cipher model (ICM), which depends on ideal environment. Therefore, it is desired to use such a proof technique model, which is close to the real world such as weak cipher model (WCM). Hence, we proposed an (n, 2n) blockcipher compression function, which is secure under the ideal cipher model, weak cipher model and extended weak cipher model (ext. WCM). Additionally, the majority of the existing schemes need multiple key schedules, where the proposed scheme and the Hirose-DM follow single key scheduling property. The efficiency-rate of our scheme is r = 1/2. Moreover, the number of blockcipher call of this scheme is 2 and it runs in parallel.
引用
收藏
页码:796 / 804
页数:9
相关论文
共 50 条
  • [31] Hash Vine: A New Hash Structure for Scalable Generation of Hierarchical Hash Codes
    Zaman, Miraz Uz
    Shen, Tong
    Min, Manki
    2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,
  • [32] DIFFERENTIAL CRYPTANALYSIS OF THE MARS BLOCKCIPHER
    Pestunov, A., I
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2009, 6 (04): : 56 - 63
  • [33] New blockcipher modes of operation with beyond the birthday bound security
    Iwata, Tetsu
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 310 - 327
  • [34] A new hash competition
    Burr, William E.
    IEEE SECURITY & PRIVACY, 2008, 6 (03) : 60 - 62
  • [35] A new efficient E-lottery scheme using multi-level hash chain
    Liu, Yi-Ning
    Hu, Lei
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1111 - +
  • [36] A new public key certificate revocation scheme based on one-way hash chain
    Li, JF
    Zhu, YF
    Pan, H
    Wei, DW
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 670 - 675
  • [37] A new strong-password authentication scheme using one-way hash functions
    Lin, C. -W.
    Tsai, C. -S.
    Hwang, M. -S.
    JOURNAL OF COMPUTER AND SYSTEMS SCIENCES INTERNATIONAL, 2006, 45 (04) : 623 - 626
  • [38] A new strong-password authentication scheme using one-way hash functions
    C. -W. Lin
    C. -S. Tsai
    M. -S. Hwang
    Journal of Computer and Systems Sciences International, 2006, 45 : 623 - 626
  • [39] A new electronic traveler's check scheme based on one-way hash function
    Liaw, Horng-Twu
    Lin, Jiann-Fu
    Wu, Wei-Chen
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2007, 6 (04) : 499 - 508
  • [40] A New Key Management Scheme in Wireless Sensor Networks Based on Hash Function and Random Variable
    Yu, Jiang
    FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION SYMPOSIUM (FSKDNC 2013), 2013, : 206 - 215