Abstract
We discuss the security of group-theoretic hash functions for cryptographic purposes. Those functions display several attractive features: they can be computed quickly, and it can be shown that local modifications of the plaintext necessarily change the hashed values. We show why the first such proposal given in [Zém91] is not secure, by giving a probabilistic algorithm for finding collisions. However, our attack is based on the special form of the matrices which were originally chosen. We propose alternative schemes which seem to be immune to such attacks.
Preview
Unable to display preview. Download preview PDF.
References
N. Alon and V. D. Milman. λ1, isoperimetric inequalities for graphs, and superconcentrators. Journal of Comb. Theory Ser. B, 38:73–88, 1985.
P. Billingsley. Ergodic theory and information. J. Wiley and son, New York, London, Sydney, 1965.
L. Babai, W. M. Kantor, and A. Lubotsky. Small-diameter cayley graphs for finite simple groups. Europ. J. of Combinatorics, 10:507–522, 1989.
P. Camion. Can a fast signature scheme without secret key be secure? In proc. AAECC, pages 187–196. Springer-Verlag Lec. N. Comp. Sci. 228, 1987.
F. R. K. Chung. Diameters and eigenvalues. J. Am Math. Soc, 2:187–196, 1989.
I. B. Damgárd. Design principles for hash functions. In Crypto, 1989.
H. Daudé. Des fractions continues, la réduction des réseaux: analyse en moyenne. PhD thesis, Université de Caen, France, 1993.
J. D. Dixon. The number of steps in the euclidean algorithm. Journal of Number Theory, pages 414–422, 1970.
H. Diamond and J. Vaaler. Estimates for partial sums of continued fraction partial quotients. Pacific Journal of mathematics, 122(1):73–82, 1986.
P. Godlewski and P. Camion. Manipulations and errors, detection and localization. In Advances in Cryptology, EUROCRYPT-88, pages 96–106. LNCS 330 Springer-Verlag, 1988.
M. Girault, P. Toffin, and B. Vallée. How to guess t-th roots modulo n by reducing lattice points. In First international joint conference of ISSAC-88 and AAECC-6, July 1988.
G. H. Hardy and E. M. Wright. An introduction to the theory of numbers. Oxford University Press, 1979.
A. Ya. Khinchin. Continued fractions (english translation). The University of Chicago Press, 1964.
N. Koblitz. Introduction to Elliptic Curves and Modular Forms. Springer-Verlag, 1984.
A. G. Kurosh. The theory of groups. NED, 1960.
G. A. Margulis. Explicit constructions of graphs without short cycles and low density codes. COMBINATORICA, 2(1):71–78, 1982.
A. Selberg. On the estimation of fourier coefficients of modular forms. AMS Proc. Symp. Pure Math., 8:1–15, 1965.
J-P. Serre. A course in arithmetic. Springer-Verlag, 1973.
G. Zémor. Hash functions and graphs with large girths. In EUROCRYPT 91. LNCS 547 Springer-Verlag, 1991.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tillich, JP., Zémor, G. (1994). Group-theoretic hash functions. In: Cohen, G., Litsyn, S., Lobstein, A., Zémor, G. (eds) Algebraic Coding. Algebraic Coding 1993. Lecture Notes in Computer Science, vol 781. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57843-9_12
Download citation
DOI: https://doi.org/10.1007/3-540-57843-9_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57843-7
Online ISBN: 978-3-540-48357-1
eBook Packages: Springer Book Archive