ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS

Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka

2010

Abstract

Hash functions using stream ciphers as components perform fast on a variety of platforms. However, the security and the design policy of stream-cipher-based hash functions (SCHs) have not yet been studied sufficiently. In this paper, we analyze its design criteria based on a ideal function of SCHs. First, we show that attacks against a stream cipher can also be threats against SCHs. Then we discuss the security on each phase of SCH; message injection, blank rounds, and hash generation with this function. Finally we derive the necessary conditions on the stream cipher function for an SCH to be secure.

Download


Paper Citation


in Harvard Style

Nakano Y., Kurihara J., Kiyomoto S. and Tanaka T. (2010). ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 334-343. DOI: 10.5220/0002939703340343

in Bibtex Style

@conference{secrypt10,
author={Yuto Nakano and Jun Kurihara and Shinsaku Kiyomoto and Toshiaki Tanaka},
title={ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={334-343},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002939703340343},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS
SN - 978-989-8425-18-8
AU - Nakano Y.
AU - Kurihara J.
AU - Kiyomoto S.
AU - Tanaka T.
PY - 2010
SP - 334
EP - 343
DO - 10.5220/0002939703340343