Abstract
We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explore the computational trade-off between the key schedule and encryption in a block cipher-based hash function and we illustrate our approach with a 256-bit hash function that has a hashing rate equivalent to the encryption rate of AES-128. The design extends naturally to a 512-bit hash function.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aiello, W., Haber, S., Venkatesan, R.: New Constructions for Secure Hash Functions. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 150–167. Springer, Heidelberg (1998)
Andreeva, E., Bouillaguet, C., Fouque, P.-A., Hoch, J., Kelsey, J., Shamir, A., Zimmer, S.: Second Preimage Attacks on Dithered Hash Functions. In: Smart, N. (ed.) Proceedings of Eurocrypt 2008. LNCS, vol. 4965, pp. 270–288. Springer, Heidelberg (2008)
Aoki, K., Lipmaa, H.: Fast Implementations of AES Candidates, http://csrc.nist.gov
Aumasson, J.P., Meier, W., Phan, R.: The Hash Function Family LAKE. In: Nyberg, K. (ed.) Proceedings of FSE 2008 (to appear, 2008)
Baretto, P., Rijmen, V.: The Whirlpool Hashing Function, paginas.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html
Bertoni, G., Daemen, J., Peeters, M., van Assche, G.: Sponge Functions. In: ECRYPT Hash Workshop, May 24-25 (2007), www.ecrypt.eu.org
Biham, E., Dunkelman, O.: A Framework for Iterative Hash Functions - HAIFA. In: Second NIST Cryptographic Hash Workshop, August 24-25 (2006), csrc.nist.gov/groups/ST/hash/
Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)
Anderson, R., Knudsen, L.R., Biham, E.: Serpent: A New Block Cipher Proposal. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 222–238. Springer, Heidelberg (1998)
Billet, O., Robshaw, M.J.B., Peyrin, T.: On Building Hash Functions from Mutivariate Quadratic Equations. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 82–95. Springer, Heidelberg (2007)
Black, J., Rogaway, P., Shrimpton, T.: Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320–335. Springer, Heidelberg (2002)
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: Present: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) Proceedings of CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)
Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård Revisited: How to Construct a Hash Functio. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430–448. Springer, Heidelberg (2005)
Damgård, I.: A Design Principle for Hash Functions. In: Brassard, G. (ed.) Advances in Cryptology – CRYPTO 1989. LNCS, vol. 435, pp. 416–427. Springer, Heidelberg (1989)
Dean, R.D.: Formal Aspects of Mobile Code Security. PhD thesis. Princeton University (1999)
Joux, A.: Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 306–316. Springer, Heidelberg (2004)
Junod, P., Vaudenay, S.: Perfect Diffusion Primitives for Block Ciphers—Building Efficient MDS Matrices. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 84–98. Springer, Heidelberg (2004)
Kelsey, J., Schneier, B.: Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474–490. Springer, Heidelberg (2005)
Kelsey, J., Kohno, T.: Herding Hash Functions and the Nostradamus Attack. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 183–200. Springer, Heidelberg (2006)
Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)
Merkle, R.C.: One Way Hash Functions and DES. In: Brassard, G. (ed.) Advances in Cryptology – CRYPTO 1989. LNCS, vol. 435, pp. 428–446. Springer, Heidelberg (1989)
Mizuno, H., Kuwakado, H., Tanaka, H.: Equivalent keys in RC6-32/20/176. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences E84-A(10), 2474–2481
National Institute of Standards and Technology. FIPS 197: Advanced Encryption Standard (November 2001), csrc.nist.gov
National Institute of Standards and Technology. AES Archive, csrc.nist.gov
National Institute of Standards and Technology. FIPS 180-2: Secure Hash Standard (August 2002), csrc.nist.gov
National Institute of Standards and Technology. FIPS 198: The Keyed-Hash Message Authentication Code (HMAC) (March 2002), csrc.nist.gov
National Institute of Standards and Technology. Announcing Request for Candidate Algorithm Nominations for a New Cryptographic Hash Algorithm (SHA-3) Family, csrc.nist.gov
Preneel, B.: Analysis and design of cryptographic hash functions. PhD thesis, Katholieke Universiteit Leuven (1993)
Rivest, R.L.: The RC5 Encryption Algorithm. In: Preneel, B. (ed.) Proceedings of FSE 1994. LNCS, vol. 1008, pp. 363–366. Springer, Heidelberg (1994)
Rivest, R.L.: RFC 1321: The MD5 Message-Digest Algorithm (April 1992), www.ietf.org/rfc/rfc1321.txt
Rivest, R.L., Robshaw, M.J.B., Sydney, R., Yin, Y.L.: The Block Cipher RC6, csrc.nist.gov
Rivest, R.L., Robshaw, M.J.B., Yin, Y.L.: The Case for RC6 as the AES, csrc.nist.gov
Rivest, R.L.: Abelian Square-Free Dithering for Iterated Hash Functions. In: First NIST Cryptographic Hash Workshop, October 31 - November 1 (2005), csrc.nist.gov/groups/ST/hash/
Saarinen, M.-J.O.: A Note Regarding the Hash Function Use of MARS and RC6, csrc.nist.gov
Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit Block Cipher CLEFIA. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181–195. Springer, Heidelberg (2007)
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)
Dai, W.: Crypto++ 5.5 Benchmarks, http://www.cryptopp.com/benchmarks.html
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Billet, O., Robshaw, M.J.B., Seurin, Y., Yin, Y.L. (2008). Looking Back at a New Hash Function. In: Mu, Y., Susilo, W., Seberry, J. (eds) Information Security and Privacy. ACISP 2008. Lecture Notes in Computer Science, vol 5107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70500-0_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-70500-0_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69971-2
Online ISBN: 978-3-540-70500-0
eBook Packages: Computer ScienceComputer Science (R0)