On parallel hash functions based on block-cipher

被引:0
|
作者
Matsuo, T
Kurosawa, K
机构
[1] Tokyo Inst Technol, Meguro Ku, Tokyo 1528552, Japan
[2] Ibaraki Univ, Hitachi, Ibaraki 3168511, Japan
关键词
hash function; block cipher;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper,We study variants of the parallel hash function construction of Damgard. We first show an improvement such that the number of processors is almost a half if \M\ = (2(s) + 1)n for some s, where M is the message to be hashed. We next show that there exists a variant of our parallel hash construction such that it is secure even if the underlying compression function is not necessarily collision-free nor one-way. The cost is that some constant times more processors are required.
引用
收藏
页码:510 / 521
页数:12
相关论文
共 50 条
  • [41] Collision Resistance of Hash Functions in Weak Ideal Cipher Model
    Hirose, Shoichi
    Kuwakado, Hidenori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 252 - 255
  • [42] Cryptanalysis of some hash functions based on block ciphers and codes
    Wu, Hongjun
    Bao, Feng
    Deng, Robert H.
    Informatica (Ljubljana), 2002, 26 (03) : 255 - 258
  • [43] A block-cipher-based hash function using an MMO-Type double-block compression function
    Hirose, Shoichi
    Kuwakado, Hidenori
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8782 : 71 - 86
  • [44] A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
    Hirose, Shoichi
    Kuwakado, Hidenori
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 71 - 86
  • [45] High-performance hardware architecture of a robust block-cipher algorithm based on different chaotic maps and DNA sequence encoding
    Amdouni, Rim
    Gafsi, Mohamed
    Guesmi, Ramzi
    Hajjaji, Mohamed Ali
    Mtibaa, Abdellatif
    Bourennane, El -Bay
    INTEGRATION-THE VLSI JOURNAL, 2022, 87 : 346 - 363
  • [46] 2N-BIT HASH-FUNCTIONS USING N-BIT SYMMETRICAL BLOCK CIPHER ALGORITHMS
    QUISQUATER, JJ
    GIRAULT, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 102 - 109
  • [47] PGV-style block-cipher-based hash families and black-box analysis
    Lee, W
    Nandi, M
    Sarkar, P
    Chang, D
    Lee, S
    Sakurai, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01): : 39 - 48
  • [48] Finding Collisions in Block Cipher-based Iterative Hash Function Schemes Using Iterative Differential
    Susanti, Bety Hayat
    Ilahi, Mohammad Heading Nor
    Amiruddin, Amiruddin
    Carita, Sa'aadah Sajjana
    Susanti, Bety Hayat, 1600, International Association of Engineers (48): : 1 - 12
  • [49] Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU
    Chen, Zhanwen
    Chen, Jiageng
    Meng, Weizhi
    Teh, Je Sen
    Li, Pei
    Ren, Bingqing
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [50] A new black box analysis of hash functions based on block ciphers
    Da L.
    Duo L.
    Henricksen M.
    Li C.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (6) : 664 - 669