scispace - formally typeset
Open AccessBook ChapterDOI

New hash functions for message authentication

Hugo Krawczyk
- pp 301-310
Reads0
Chats0
TLDR
It is shown that Toeplitz matrices generated by sequences drawn from small biased distributions provide hashing schemes applicable to secure message authentication and the interest of these schemes extends beyond the proposed cryptographic applications to other uses of universal hashing.
Abstract
We show that Toeplitz matrices generated by sequences drawn from small biased distributions provide hashing schemes applicable to secure message authentication. This work extends our previous results from Crypto'94 [4] where an authentication scheme based on Toeplitz matrices generated by linear feedback shift registers was presented. Our new results have as special case the LFSR-based construction but extend to a much wider and general family of sequences, including several simple and efficient constructions with close to optimal security. Examples of the new constructions include Toeplitz matrices generated by the Legendre symbols of consecutive integers modulo a prime (of size significantly shorter than required by public-key modular arithmetic) as well as other algebraic constructions. The interest of these schemes extends beyond the proposed cryptographic applications to other uses of universal hashing (including other cryptographic applications).

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Modern Cryptography, Probabilistic Proofs and Pseudorandomness

TL;DR: This book focuses on cryptography along with two related areas: the study of probabilistic proof systems, and the theory of computational pseudorandomness, following a common theme that explores the interplay between randomness and computation.
Journal ArticleDOI

Grain-128a: a new version of Grain-128 with optional authentication

TL;DR: A new version of the stream cipher Grain-128 is proposed, strengthened against all known attacks and observations on the original Grain- 128, and has built-in support for optional authentication.
Book ChapterDOI

MMH: Software Message Authentication in the Gbit/Second Rates

TL;DR: This work describes a construction of almost universal hash functions suitable for very fast software implementation and applicable to the hashing of variable size data and fast cryptographic message authentication.
Proceedings Article

HB # : increasing the security and efficiency of HB +

TL;DR: In this article, the authors proposed an enhanced version of the HB+ protocol, called HB#, which is provably resistant to a broader class of active attacks, including the attack of Gilbert et al.
Journal ArticleDOI

Quantum-secured blockchain

TL;DR: A possible solution to the quantum era blockchain challenge is proposed and an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information-theoretically secure authentication is reported.
References
More filters
Journal ArticleDOI

New hash functions and their use in authentication and set equality

TL;DR: Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.
Journal ArticleDOI

Small-bias probability spaces: efficient constructions and applications

TL;DR: It is shown how to efficiently construct a small probability space on n binary random variables such that for every subset, its parity is either zero or one with “almost” equal probability.
Book ChapterDOI

LFSR-based Hashing and Authentication

TL;DR: The characterization of the properties required from a family of hash functions in order to be secure for authentication when combined with a (secure) stream cipher is characterization.
Journal ArticleDOI

Learning decision trees using the Fourier spectrum

TL;DR: The authors demonstrate that any function f whose $L_1 $-norm is polynomial can be approximated by a polynomially sparse function, and prove that boolean decision trees with linear operations are a subset of this class of functions.
Journal ArticleDOI

Universal hashing and authentication codes

TL;DR: The application of universal hashing to the construction of unconditionally secure authentication codes without secrecy is studied and some new classes of hash functions are defined and some general constructions for these classes are given.