Skip to main content

Version of the New SHA Standard Applied to Manage Certificate Revocation in VANETs

  • Conference paper
Advances in Computational Intelligence (IWANN 2013)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7902))

Included in the following conference series:

  • 2619 Accesses

Abstract

This work describes the application of a new version of the Secure Hash Algorithm SHA-3 that was recently chosen as standard, in order to improve the performance of certificate revocation in Vehicular Ad-hoc NETworks (VANETs), which are interesting self-organizing networks. Specifically, we propose the use of both a duplex construction instead of the sponge one present in the SHA-3 version of the Keccak hash function, and a dynamic authenticated data structure based on B-trees, which allows taking advantage of such a construction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Andreeva, E., Mennink, B., Preneel, B.: Security reductions of the second round SHA-3 candidates. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 39–53. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document (2009), http://keccak.noekeon.org/Keccak-main-2.1.pdf

  3. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications, Submission to NIST, Round 2 (2010), http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/documents/papers/DAEMEN_DuplexSponge.pdf

  4. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission, Submission to NIST, Round 3 (2011), http://keccak.noekeon.org/Keccak-submission-3.pdf

  5. Chang, S., Perlner, R., Burr, W., Turan, M., Kelsey, J., Paul, S., Bassham, L.: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition, NIST (2012), http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7896.pdf

  6. Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: Toward Revocation Data Handling Efficiency in VANETs. In: Vinel, A., Mehmood, R., Berbineau, M., Garcia, C.R., Huang, C.-M., Chilamkurti, N. (eds.) Nets4Cars/Nets4Trains 2012. LNCS, vol. 7266, pp. 80–90. Springer, Heidelberg (2012)

    Google Scholar 

  7. Homsirikamol, E., Rogawski, M., Gaj, K.: Comparing Hardware Performance of Fourteen Round two SHA-3 Candidates using FPGAs, Cryptology ePrint Archive, Report 2010/445, 210 (2010), http://eprint.iacr.org/2010/445 (January 15, 2011)

  8. Jakobsson, M., Wetzel, S.: Efficient attribute authentication with applications to ad hoc networks. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 38–46 (2004)

    Google Scholar 

  9. Knuth, D.: Sorting and Searching, The Art of Computer Programming, 2nd edn., vol. 3, pp. 476–477, pp. 481–491. Addison-Wesley (1998)

    Google Scholar 

  10. Martin, F., Caballero, P.: Analysis of the New Standard Hash Function SHA-3. In: Fourteenth International Conference On Computer Aided Systems Theory, Las Palmas de Gran Canaria Spain (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Martín-Fernández, F., Caballero-Gil, P. (2013). Version of the New SHA Standard Applied to Manage Certificate Revocation in VANETs. In: Rojas, I., Joya, G., Gabestany, J. (eds) Advances in Computational Intelligence. IWANN 2013. Lecture Notes in Computer Science, vol 7902. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38679-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38679-4_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38678-7

  • Online ISBN: 978-3-642-38679-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics