Nothing Special   »   [go: up one dir, main page]

Skip to main content

Square Hash with a Small Key Size

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2727))

Included in the following conference series:

Abstract

This paper shows an improvement of square hash function family proposed by Etzel et al. [5]. In the new variants, the size of keys is much shorter while the collision probability is slightly larger. Most of the main techniques used to optimize the original square hash functions work on our variants as well. The proposed algorithms are applicable to fast and secure message authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. V. Afanassiev, C. Gehrmann and B. Smeets, “Fast message authentication using efficient polynomial evaluation,” Fast Software Encryption, FSE’ 97, LNCS 1267, pp. 190–204, Springer Verlag, 1997.

    Chapter  Google Scholar 

  2. J. Black, S. Halevi, H. Krawczyk, T. Krovetz and P. Rogaway, “UMAC: Fast and secure message authentication,” Advances in Cryptology — CRYPTO’ 99, LNCS 1666, pp. 216–233, Springer-Verlag, 1999.

    Google Scholar 

  3. M. Bellare, J. Killian and P. Rogaway, “The security of cipher block chaining,” Advances in Cryptology—CRYPTO’ 94, LNCS 839, pp. 341–358, Springer-Verlag, 1994.

    Google Scholar 

  4. J. L. Carter and M. N. Wegman, “Universal classes of hash functions,” Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979.

    Article  MATH  MathSciNet  Google Scholar 

  5. M. Etzel, S. Patel and Z. Ramzan, “Square Hash: Fast message authentication via optimized universal hash functions,” Advances in Cryptology — CRYPTO’ 99, LNCS 1666, pp. 234–251, Springer-Verlag, 1999.

    Google Scholar 

  6. S. Halevi and H. Krawczyk, “MMH: Message authentication in software in the gbit/second rates,” Fast Software Encryption, FSE’ 97, LNCS 1267, pp. 172–189, Springer Verlag, 1997.

    Chapter  Google Scholar 

  7. T. Johansson, “Bucket hashing with smaller key size,” Advances in Cryptology — EUROCRYPT’ 97, LNCS 1233, pp. 149–162, Springer-Verlag, 1997.

    Google Scholar 

  8. H. Krawczyk, “LFSR-based hashing and authentication,” Advances in Cryptology — CRYPTO’ 94, LNCS 839, pp. 129–139, Springer-Verlag, 1994.

    Google Scholar 

  9. H. Krawczyk, “New hash functions for message authentication,” Advances in Cryptology — EUROCRYPT’ 95, LNCS 921, pp. 301–310, Springer-Verlag, 1995.

    Google Scholar 

  10. T. Krovetz and P. Rogaway, “Fash universal hashing with small keys and no prepocessing: the polyR construction,” International Conference on Information Security and Cryptology — ICISC’ 00, LNCS 2015, pp. 73–89, Springer Verlag, 2001.

    Chapter  Google Scholar 

  11. A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.

    Google Scholar 

  12. P. Rogaway, “Bucket hashing and its application to fast message authentication,” Advances in Cryptology — CRYPTO’ 95, LNCS 963, pp. 15–25, Springer-Verlag, 1995.

    Google Scholar 

  13. V. Shoup, “On fast and provably secure message authentication based on universal hashing,” Advances in Cryptology — CRYPTO’ 96, LNCS 1109, pp. 313–328, Springer-Verlag, 1996.

    Chapter  Google Scholar 

  14. D. R. Stinson, “Universal hashing and authentication codes,” Designs, Codes and Cryptography, vol. 4, pp. 369–380, 1994.

    Article  MATH  MathSciNet  Google Scholar 

  15. M. N. Wegman and J. L. Carter, “New hash functions and their use in authentication and set equality,” Journal of Computer and System Sciences, vol. 22, no. 3, pp. 265–279, 1981.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Heng, SH., Kurosawa, K. (2003). Square Hash with a Small Key Size. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_45

Download citation

  • DOI: https://doi.org/10.1007/3-540-45067-X_45

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40515-3

  • Online ISBN: 978-3-540-45067-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics