scispace - formally typeset
Open AccessBook ChapterDOI

LFSR-based Hashing and Authentication

Hugo Krawczyk
- pp 129-139
Reads0
Chats0
TLDR
The characterization of the properties required from a family of hash functions in order to be secure for authentication when combined with a (secure) stream cipher is characterization.
Abstract
We present simple and efficient hash functions applicable to secure authentication of information The constructions are mainly intended for message authentication in systems implementing stream cipher encryption and are suitable for other applications as well The proposed hash functions are implemented through linear feedback shift registers and therefore attractive for hardware applications As an example, a single 64 bit LFSR will be used to authenticate 1 Gbit of information with a failure probability of less than 2-30 One of the constructions is the cryptographic version of the well known cyclic redundancy codes (CRC); the other is based on Toeplitz hashing where the matrix entries are generated by a LFSR The later construction achieves essentially the same hashing and authentication strength of a completely random matrix but at a substantially lower cost in randomness, key size and implementation complexity Of independent interest is our characterization of the properties required from a family of hash functions in order to be secure for authentication when combined with a (secure) stream cipher

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

FPGA Intrinsic PUFs and Their Use for IP Protection

TL;DR: New protocols for the IP protection problem on FPGAs are proposed and the first construction of a PUF intrinsic to current FPGA based on SRAM memory randomness present on current FFPAs is provided.
Proceedings ArticleDOI

Hash-based IP traceback

TL;DR: This work presents a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past and is implementable in current or next-generation routing hardware.
Proceedings ArticleDOI

HAIL: a high-availability and integrity layer for cloud storage

TL;DR: The HighAvailability and Integrity Layer (HAIL) as discussed by the authors is a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable.
Book ChapterDOI

The security and performance of the galois/counter mode (GCM) of operation

TL;DR: GCM is shown to be the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and empirical data from studies of Internet traffic in conjunction with software experiments and hardware designs.
Proceedings ArticleDOI

Authenticated-encryption with associated-data

TL;DR: This paper formalizes and investigates the authenticated-encryption with associated-data (AEAD) problem, and studies two simple ways to turn an authenticated-Encryption scheme that does not support associated- data into one that does: nonce stealing and ciphertext translation.
References
More filters
Journal ArticleDOI

Universal classes of hash functions

TL;DR: An input independent average linear time algorithm for storage and retrieval on keys that makes a random choice of hash function from a suitable class of hash functions.
Journal ArticleDOI

New hash functions and their use in authentication and set equality

TL;DR: Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.
Book

Finite fields

Rudolf Lidl
Related Papers (5)