On parallel hash functions based on block-cipher

被引:0
|
作者
Matsuo, T
Kurosawa, K
机构
[1] Tokyo Inst Technol, Meguro Ku, Tokyo 1528552, Japan
[2] Ibaraki Univ, Hitachi, Ibaraki 3168511, Japan
关键词
hash function; block cipher;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper,We study variants of the parallel hash function construction of Damgard. We first show an improvement such that the number of processors is almost a half if \M\ = (2(s) + 1)n for some s, where M is the message to be hashed. We next show that there exists a variant of our parallel hash construction such that it is secure even if the underlying compression function is not necessarily collision-free nor one-way. The cost is that some constant times more processors are required.
引用
收藏
页码:510 / 521
页数:12
相关论文
共 50 条
  • [21] Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations
    Rim Amdouni
    Mohamed Gafsi
    Nessrine Abbassi
    Mohamed Ali Hajjaji
    Abdellatif Mtibaa
    Multimedia Tools and Applications, 2023, 82 : 37097 - 37130
  • [22] Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations
    Amdouni, Rim
    Gafsi, Mohamed
    Abbassi, Nessrine
    Hajjaji, Mohamed Ali
    Mtibaa, Abdellatif
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (24) : 37097 - 37130
  • [23] A new hardware efficient stream cipher based on hash functions
    Deepthi, P. P.
    Sathidevi, P. S.
    Lakshmi, V. S.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (04) : 340 - 361
  • [24] A Scheme to Base a Hash Function on a Block Cipher
    Hirose, Shoichi
    Kuwakado, Hidenori
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 262 - +
  • [25] Block-cipher scheme based on back-iteration of the 2-D cellular automata
    Madjarova, M
    Kakuta, M
    Obi, T
    Yamaguchi, M
    Ohyama, N
    MULITMEDIA NETWORKS: SECURITY, DISPLAYS, TERMINALS, AND GATEWAYS, 1998, 3228 : 377 - 387
  • [26] A new message authentication code based on hash function and block cipher
    Xu, Jin
    Wen, Qiao-Yan
    Wang, Da-Yin
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (04): : 793 - 803
  • [27] DCBC: A Distributed High-performance Block-Cipher Mode of Operation
    Trabelsi, Oussama
    Sfaxi, Lilia
    Robbana, Riadh
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 86 - 97
  • [28] Analysis of Message Injection in Stream Cipher-Based Hash Functions
    Nakano, Yuto
    Cid, Carlos
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 498 - 513
  • [29] Opto-Electronic Block-Cipher Based on Iteration of the 2-D Toggle Cellular Automata: Algorithm
    Maria Madjarova
    Mitsugu Kakuta
    Takashi Obi
    Masahiro Yamaguchi
    Nagaaki Ohyama
    Optical Review, 1999, 6 : 110 - 117
  • [30] Opto-electronic block-cipher based on iteration of the 2-D toggle cellular automata: Algorithm
    Madjarova, M
    Kakuta, M
    Obi, T
    Yamaguchi, M
    Ohyama, N
    OPTICAL REVIEW, 1999, 6 (02) : 110 - 117