LFSR-based Hashing and Authentication
Hugo Krawczyk
- pp 129-139
Reads0
Chats0
TLDR
The characterization of the properties required from a family of hash functions in order to be secure for authentication when combined with a (secure) stream cipher is characterization.Abstract:
We present simple and efficient hash functions applicable to secure authentication of information The constructions are mainly intended for message authentication in systems implementing stream cipher encryption and are suitable for other applications as well The proposed hash functions are implemented through linear feedback shift registers and therefore attractive for hardware applications As an example, a single 64 bit LFSR will be used to authenticate 1 Gbit of information with a failure probability of less than 2-30 One of the constructions is the cryptographic version of the well known cyclic redundancy codes (CRC); the other is based on Toeplitz hashing where the matrix entries are generated by a LFSR The later construction achieves essentially the same hashing and authentication strength of a completely random matrix but at a substantially lower cost in randomness, key size and implementation complexity Of independent interest is our characterization of the properties required from a family of hash functions in order to be secure for authentication when combined with a (secure) stream cipherread more
Citations
More filters
Book ChapterDOI
FPGA Intrinsic PUFs and Their Use for IP Protection
TL;DR: New protocols for the IP protection problem on FPGAs are proposed and the first construction of a PUF intrinsic to current FPGA based on SRAM memory randomness present on current FFPAs is provided.
Proceedings ArticleDOI
Hash-based IP traceback
Alex C. Snoeren,Craig Partridge,Luis Sanchez,Christine Elaine Jones,Fabrice Tchakountio,Stephen T. Kent,W. Timothy Strayer +6 more
TL;DR: This work presents a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past and is implementable in current or next-generation routing hardware.
Proceedings ArticleDOI
HAIL: a high-availability and integrity layer for cloud storage
TL;DR: The HighAvailability and Integrity Layer (HAIL) as discussed by the authors is a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable.
Book ChapterDOI
The security and performance of the galois/counter mode (GCM) of operation
David McGrew,John Viega +1 more
TL;DR: GCM is shown to be the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and empirical data from studies of Internet traffic in conjunction with software experiments and hardware designs.
Proceedings ArticleDOI
Authenticated-encryption with associated-data
TL;DR: This paper formalizes and investigates the authenticated-encryption with associated-data (AEAD) problem, and studies two simple ways to turn an authenticated-Encryption scheme that does not support associated- data into one that does: nonce stealing and ciphertext translation.
References
More filters
Journal ArticleDOI
Encyclopedia of Mathematics and its Applications.
William B. Jones,W. J. Thron +1 more
Journal ArticleDOI
Universal classes of hash functions
TL;DR: An input independent average linear time algorithm for storage and retrieval on keys that makes a random choice of hash function from a suitable class of hash functions.
Journal ArticleDOI
New hash functions and their use in authentication and set equality
TL;DR: Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.