ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS
Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka
2010
Abstract
Hash functions using stream ciphers as components perform fast on a variety of platforms. However, the security and the design policy of stream-cipher-based hash functions (SCHs) have not yet been studied sufficiently. In this paper, we analyze its design criteria based on a ideal function of SCHs. First, we show that attacks against a stream cipher can also be threats against SCHs. Then we discuss the security on each phase of SCH; message injection, blank rounds, and hash generation with this function. Finally we derive the necessary conditions on the stream cipher function for an SCH to be secure.
DownloadPaper Citation
in Harvard Style
Nakano Y., Kurihara J., Kiyomoto S. and Tanaka T. (2010). ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 334-343. DOI: 10.5220/0002939703340343
in Bibtex Style
@conference{secrypt10,
author={Yuto Nakano and Jun Kurihara and Shinsaku Kiyomoto and Toshiaki Tanaka},
title={ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={334-343},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002939703340343},
isbn={978-989-8425-18-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS
SN - 978-989-8425-18-8
AU - Nakano Y.
AU - Kurihara J.
AU - Kiyomoto S.
AU - Tanaka T.
PY - 2010
SP - 334
EP - 343
DO - 10.5220/0002939703340343