Efficient computation of hashes

被引:0
|
作者
Lopes, Raul H. C. [1 ]
Franqueira, Virginia N. L. [2 ]
Hobson, Peter R. [1 ]
机构
[1] Brunel Univ, Sch Engn & Design, Particle Phys Grp, Uxbridge UB8 3PH, Middx, England
[2] Univ Cent Lancashire, Sch Comp Engn & Phys Sci, Preston PR1 2HE, Lancs, England
基金
英国科学技术设施理事会;
关键词
D O I
10.1088/1742-6596/513/3/032042
中图分类号
O57 [原子核物理学、高能物理学];
学科分类号
070202 ;
摘要
The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel hash tree modes. The main contributions of this paper are, first, the identification of several efficiency and security challenges posed by the use of sequential hash computation based on the Merkle-Damgard engine. In addition, alternatives for the parallel computation of hash trees are discussed, and a prototype for a new parallel implementation of the Keccak function, the SHA-3 winner, is introduced.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Hashes
    Aggarwal, Shubhani
    Kumar, Neeraj
    BLOCKCHAIN TECHNOLOGY FOR SECURE AND SMART APPLICATIONS ACROSS INDUSTRY VERTICALS, 2021, 121 : 83 - 93
  • [2] When hashes collide
    Gutmann, P
    Naccache, D
    Palmer, CC
    IEEE SECURITY & PRIVACY, 2005, 3 (03) : 68 - 71
  • [3] Collapseability of Tree Hashes
    Gunsing, Aldo
    Mennink, Bart
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 524 - 538
  • [4] The Security of Cryptographic Hashes
    Teat, Chad
    Peltsverger, Svetlana
    PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 103 - 108
  • [5] Privacy and Robust Hashes
    Steinebach, Martin
    Lutz, Sebastian
    Liu, Huajian
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [6] Efficient outside computation
    Gildea D.
    Computational Linguistics, 2020, 46 (04): : 745 - 762
  • [7] EFFICIENT COMPUTATION.
    Moharir, P.S.
    IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 1985, 2 (01): : 1 - 6
  • [8] Efficient computation of ΔHab
    Stokes, Mike
    Brill, Michael H.
    Color Research and Application, 1992, 17 (06):
  • [9] SECURITY OF ROBUST AUDIO HASHES
    Thiemert, Stefan
    Nuernberger, Stefan
    Steinebach, Martin
    Zmudzinski, Sascha
    2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 126 - 130
  • [10] An evaluation of forensic similarity hashes
    Roussev, Vassil
    DIGITAL INVESTIGATION, 2011, 8 : S34 - S41