Abstract
We improve Knudsen-Preneel’s constructions for cryptographic hash functions based on block ciphers with error correcting codes. We first modify to extend original constructions, which are effective only for non-binary codes, to the case with binary codes (e.g. BCH codes). We also revise the original method by introducing convolutional codes, whereas the previous adapts only block codes. This reduces the circuit complexity of the hardware-implementation 1/N times in terms of the number of (Davies-Meyer’s) module functions than that based block error correcting codes.
Chapter PDF
References
Damgard, I.B.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416–427. Springer, Heidelberg (1990)
den Boer, B., Bosselaers, A.: Collisions for the compression function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 293–304. Springer, Heidelberg (1994)
Davies, D.W., Price, W.L.: Digital Signature An Update. Proceedings of International Conference on Computer Communications, pp. 843–847. Elsevier, North Holland (1985)
Dobbertin, H.: Cryptanarysis of MD5 compress. Presented at the rump session of EUROCRYPT 1996 (May 1996)
Dobbertin, H.: Cryptanalysis of MD4. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 53–69. Springer, Heidelberg (1996)
Hohl, W., Lai, X., Meier, T., Waldvogel, C.: Security of iterated hash functions based on block ciphers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 379–390. Springer, Heidelberg (1994)
ISO/IEC 10118, Information technology, Security techniques, Hashfunctions, Part1: General and Part2: Hash-functions using an n-bit block cipher algorithm
Knudsen, L.R.: Analysis and design of cryptographic hash functions, Doctoral Dissertation, Katholieke Universiteit Leuven (1993)
Knudsen, L.R., Govaerts, R., Vandewalle, J.: On the power of memory in the design of collision resistant hash functions. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 105–121. Springer, Heidelberg (1993)
Knudsen, L.R.: A Key-schedule Weakness in SAFER K-64. In: Desmedt, Y. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 274–286. Springer, Heidelberg (1994)
Knudsen, L.R., Lai, X.: New attacks on all double block length hash functions of hash rate 1, including the pararell-DM. In: Li, M., Du, D.-Z. (eds.) COCOON 1995. LNCS, vol. 959, pp. 410–418. Springer, Heidelberg (1995)
Knudsen, L.R., Preneel, B.: Hash functions based on block ciphers and quaternary codes. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 77–90. Springer, Heidelberg (1996)
Knudsen, L., Preneel, B.: Fast and secure hashing based on codes. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 485–498. Springer, Heidelberg (1997)
Lai, X.: On the Design and Security of Block Ciphers. In: Massey, J.L. (ed.) ETH Series in Information Processing, vol. 1. Hartung-Gorre Verlag, Konstanz (1992)
Lai, X., Massey, J.: A Proposal for a New Block Encryption Standard. In: Advances in Cryptology-EUROCRYPTO 1990 Proceedings, pp. 389–404. Springer, Heidelberg (1991)
Lin, S.: An Introduction to Error Correction Codes, Englewood Cliffs., NJ, Ch.10 (1970)
Macwilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland Publishing Company, Amsterdam (1978)
Matyas, S.M., Meyer, C.H., Oseas, J.: Generating strong one-way functions with cryptographic algorithm. IBM Techn. Disclosure, Bull. 27(10A), 5658–5659 (1985)
Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428–446. Springer, Heidelberg (1990)
Meyer, C.H., Schilling, M.: Secure program load with Manipulation Detection Code. In: Proc. Securicom 1988, pp. 111–130 (1988)
Massey, J.L.: Threshold Decoding. MIT Press, Cambridge (1963)
Matsui, M.: New structure of block ciphers with provable security against differential and linear cryptoanalysis. In: The third international workshop of fast software encryption (1996)
Moore, J.H., Simmons, G.J.: Cyclic structure of the DES for keys having palindromic (or antipalindromic) sequences of round keys. IEEE Trans. On Software Engineering SE-13(2), 262–273 (1987)
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: Proc. 21st ACM Symposium on the Theory of Computing, pp. 387–394. ACM, New York (1989)
Preneel, B., Govaets, R., Vandewalle, J.: Hash functions based on block ciphers: a synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368–378. Springer, Heidelberg (1994)
Quisquater, J.-J., Delescaille, J.-P.: How easy is collision search? Application to DES. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 429–434. Springer, Heidelberg (1990)
Rivest, R.L.: The MD4 message digest algorithm. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 303–311. Springer, Heidelberg (1991)
Rivest, R.L.: The MD5 message digest algorithm, Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task force (April 1992)
Rijmen, V., Preneel, B.: Improved characteristics for differential cryptanalysis of hash functions based on block ciphers. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 242–248. Springer, Heidelberg (1995)
Schneier, B.: Applied cryptography, pp. 451–452. John Wiley & Sons, Inc, New York (1996)
Van Oorshot, P.C., Wiener, M.J.: Parallel collision search with application to hash functions and discrete logarithms. In: Proc. 2nd ACM Conference on Computer and Communications Security, pp. 210–218. ACM, New York (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Inoue, T., Sakurai, K. (2000). Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes. In: Imai, H., Zheng, Y. (eds) Public Key Cryptography. PKC 2000. Lecture Notes in Computer Science, vol 1751. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-46588-1_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-46588-1_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66967-8
Online ISBN: 978-3-540-46588-1
eBook Packages: Springer Book Archive