A new hash function based on block cipher

被引:0
|
作者
Yi, X [1 ]
Lam, KY
机构
[1] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[2] Natl Univ Singapore, Dept Informat Syst & Comp Sci, Singapore 117548, Singapore
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper a new 2m-bit iterated hash function based on a m-bit block cipher with a 2m-bit key is proposed. The hash round function in the new scheme utilizes a single underlying block cipher and can completely resist target attack, collision attack and semi-free-start collision attack. The new scheme can be expected to have ideal computational security against five attacks when the underlying cipher is assumed to have no weakness.
引用
收藏
页码:139 / 146
页数:8
相关论文
共 50 条
  • [21] The shade cipher: An efficient hash-function-based Feistel network
    Adams, C
    1997 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CONFERENCE PROCEEDINGS, VOLS I AND II: ENGINEERING INNOVATION: VOYAGE OF DISCOVERY, 1997, : 338 - 342
  • [22] A New Approach for Encryption System Based on Block Cipher Algorithms and Logistic Function
    Sbiaa, Fatma
    Zeghid, Medien
    Baganne, Adel
    Tourki, Rached
    2015 IEEE 12TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2015,
  • [23] Side channel attacks against HMACs based on block-cipher based hash functions
    Okeya, Katsuyuki
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 432 - 443
  • [24] On the Simon Cipher 4-Block Key Schedule as a Hash
    Degnan, Brian
    Durgin, Gregory
    Maeda, Suigin
    2017 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2017,
  • [25] Hardware Implementation of Simeck Cipher as a Lightweight Hash Function
    Bhoyar, Prachin
    Dhok, Sanjay
    Deshmukh, Raghavendra
    ADVANCES IN VLSI, COMMUNICATION, AND SIGNAL PROCESSING, 2020, 587 : 125 - 131
  • [26] Application of Stream Cipher and Hash Function in Network Security
    Jain, Aaditya
    Mangal, Neha
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 429 - 435
  • [27] Forgery Attack on LightMAC Hash Function Scheme using SIMECK 32/64 Lightweight Block Cipher
    Darumaya, T. A.
    Susanti, B. H.
    INTERNATIONAL CONFERENCE ON DESIGN, ENGINEERING AND COMPUTER SCIENCES, 2018, 453
  • [28] A new block cipher based on chaotic tent maps
    Yi, X
    Tan, CH
    Siew, CK
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS, 2002, 49 (12): : 1826 - 1829
  • [29] The Ideal-Cipher Model, revisited: An uninstantiable blockcipher-based hash function
    Black, John
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 328 - 340
  • [30] A Single chip implementation of AES cipher and Whirlpool hash function
    Kochar, Tarun
    Nandi, Sukumar
    Biswas, Santosh
    2009 ANNUAL IEEE INDIA CONFERENCE (INDICON 2009), 2009, : 78 - 81