loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Yuto Nakano ; Jun Kurihara ; Shinsaku Kiyomoto and Toshiaki Tanaka

Affiliation: KDDI R&D Laboratories Inc., Japan

ISBN: 978-989-8425-18-8

Keyword(s): Hash function, Stream cipher, Collision resistance, Second preimage resistance, Preimage resistance.

Related Ontology Subjects/Areas/Topics: Cryptographic Techniques and Key Management ; Information and Systems Security ; Mobile Code & Agent Security ; Smart Card Security

Abstract: Hash functions using stream ciphers as components perform fast on a variety of platforms. However, the security and the design policy of stream-cipher-based hash functions (SCHs) have not yet been studied sufficiently. In this paper, we analyze its design criteria based on a ideal function of SCHs. First, we show that attacks against a stream cipher can also be threats against SCHs. Then we discuss the security on each phase of SCH; message injection, blank rounds, and hash generation with this function. Finally we derive the necessary conditions on the stream cipher function for an SCH to be secure.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.206.194.210

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Nakano Y.; Kurihara J.; Kiyomoto S.; Tanaka T. and (2010). ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 334-343. DOI: 10.5220/0002939703340343

@conference{secrypt10,
author={Yuto Nakano and Jun Kurihara and Shinsaku Kiyomoto and Toshiaki Tanaka},
title={ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={334-343},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002939703340343},
isbn={978-989-8425-18-8},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS
SN - 978-989-8425-18-8
AU - Nakano, Y.
AU - Kurihara, J.
AU - Kiyomoto, S.
AU - Tanaka, T.
PY - 2010
SP - 334
EP - 343
DO - 10.5220/0002939703340343

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.