Questioning the Criteria for Evaluating Non-cryptographic Hash Functions

被引:0
|
作者
Hayes, Catherine [1 ]
Malone, David [1 ]
机构
[1] Maynooth University, 60026281, Ireland
来源
Queue | 2024年 / 22卷 / 04期
关键词
Hash functions;
D O I
10.1145/3690759
中图分类号
学科分类号
摘要
Although cryptographic and non-cryptographic hash functions are everywhere, there seems to be a gap in how they are designed. Lots of criteria exist for cryptographic hashes motivated by various security requirements, but on the non-cryptographic side there is a certain amount of folklore that, despite the long history of hash functions, has not been fully explored. While targeting a uniform distribution makes a lot of sense for real-world datasets, it can be a challenge when confronted by a dataset with particular patterns. © 2024 Owner/Author.
引用
收藏
页码:54 / 72
相关论文
共 50 条
  • [31] Non-Cryptographic Methods of MAC Spoof Detection in Wireless LAN
    Bansal, Richa
    Tiwari, Siddharth
    Bansal, Divya
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 344 - 349
  • [32] Non-Cryptographic Security to Data: Distortion based Anonymization Techniques
    Banu, K. Sharmila
    Santhi, V.
    Tripathy, B. K.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY (ICAET), 2014,
  • [33] NONLINEARITY CRITERIA FOR CRYPTOGRAPHIC FUNCTIONS
    MEIER, W
    STAFFELBACH, O
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 549 - 562
  • [34] Enhancing security and randomness in cryptography and non-cryptographic applications with ORNA algorithm
    Goswami, Yagyadatta
    Mittal, Avneesh
    Das, Kaushik
    Kumar, Smit
    Gautam, Kumar
    Sai, Manish Kumar
    ENGINEERING RESEARCH EXPRESS, 2024, 6 (04):
  • [35] Anti-disassembly using cryptographic hash functions
    Aycock, John
    deGraaf, Rennie
    Jacobson, Michael, Jr.
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 79 - 85
  • [36] Efficient negative databases from cryptographic hash functions
    Danezis, George
    Diaz, Claudia
    Faust, Sebastian
    Kaesper, Emilia
    Troncoso, Carmela
    Preneel, Bart
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 423 - +
  • [37] Finding state-of-the-art non-cryptographic hashes with genetic programming
    Estebanez, Cesar
    Hernandez-Castro, Julio Cesar
    Ribagorda, Arturo
    Isasi, Pedro
    PARALLEL PROBLEM SOLVING FROM NATURE - PPSN IX, PROCEEDINGS, 2006, 4193 : 818 - 827
  • [38] Black-Box Property of Cryptographic Hash Functions
    Rjasko, Michal
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 181 - 193
  • [39] A family of fast syndrome based cryptographic hash functions
    Augot, D
    Finiasz, M
    Sendrier, N
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 64 - 83
  • [40] Anti-disassembly using Cryptographic Hash Functions
    John Aycock
    Rennie deGraaf
    Michael Jacobson
    Journal in Computer Virology, 2006, 2 (1): : 79 - 85