New hash functions for message authentication
Hugo Krawczyk
- pp 301-310
Reads0
Chats0
TLDR
It is shown that Toeplitz matrices generated by sequences drawn from small biased distributions provide hashing schemes applicable to secure message authentication and the interest of these schemes extends beyond the proposed cryptographic applications to other uses of universal hashing.Abstract:
We show that Toeplitz matrices generated by sequences drawn from small biased distributions provide hashing schemes applicable to secure message authentication. This work extends our previous results from Crypto'94 [4] where an authentication scheme based on Toeplitz matrices generated by linear feedback shift registers was presented.
Our new results have as special case the LFSR-based construction but extend to a much wider and general family of sequences, including several simple and efficient constructions with close to optimal security. Examples of the new constructions include Toeplitz matrices generated by the Legendre symbols of consecutive integers modulo a prime (of size significantly shorter than required by public-key modular arithmetic) as well as other algebraic constructions. The interest of these schemes extends beyond the proposed cryptographic applications to other uses of universal hashing (including other cryptographic applications).read more
Citations
More filters
Book
Modern Cryptography, Probabilistic Proofs and Pseudorandomness
TL;DR: This book focuses on cryptography along with two related areas: the study of probabilistic proof systems, and the theory of computational pseudorandomness, following a common theme that explores the interplay between randomness and computation.
Journal ArticleDOI
Grain-128a: a new version of Grain-128 with optional authentication
TL;DR: A new version of the stream cipher Grain-128 is proposed, strengthened against all known attacks and observations on the original Grain- 128, and has built-in support for optional authentication.
Book ChapterDOI
MMH: Software Message Authentication in the Gbit/Second Rates
Shai Halevi,Hugo Krawczyk +1 more
TL;DR: This work describes a construction of almost universal hash functions suitable for very fast software implementation and applicable to the hashing of variable size data and fast cryptographic message authentication.
Proceedings Article
HB # : increasing the security and efficiency of HB +
TL;DR: In this article, the authors proposed an enhanced version of the HB+ protocol, called HB#, which is provably resistant to a broader class of active attacks, including the attack of Gilbert et al.
Journal ArticleDOI
Quantum-secured blockchain
Evgeniy O. Kiktenko,N.O. Pozhar,M.N. Anufriev,Anton Trushechkin,R. R. Yunusov,Yury Kurochkin,A. I. Lvovsky,Aleksey Fedorov +7 more
TL;DR: A possible solution to the quantum era blockchain challenge is proposed and an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information-theoretically secure authentication is reported.
References
More filters
Journal ArticleDOI
New hash functions and their use in authentication and set equality
TL;DR: Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.
Journal ArticleDOI
Small-bias probability spaces: efficient constructions and applications
Joseph (Seffi) Naor,Moni Naor +1 more
TL;DR: It is shown how to efficiently construct a small probability space on n binary random variables such that for every subset, its parity is either zero or one with “almost” equal probability.
Book ChapterDOI
LFSR-based Hashing and Authentication
TL;DR: The characterization of the properties required from a family of hash functions in order to be secure for authentication when combined with a (secure) stream cipher is characterization.
Journal ArticleDOI
Learning decision trees using the Fourier spectrum
Eyal Kushilevitz,Yishay Mansour +1 more
TL;DR: The authors demonstrate that any function f whose $L_1 $-norm is polynomial can be approximated by a polynomially sparse function, and prove that boolean decision trees with linear operations are a subset of this class of functions.
Journal ArticleDOI
Universal hashing and authentication codes
TL;DR: The application of universal hashing to the construction of unconditionally secure authentication codes without secrecy is studied and some new classes of hash functions are defined and some general constructions for these classes are given.