Abstract
This paper proposes a new hash function using two-dimensional cellular automata. The cellular structure of 5-neighborhood 2D CA is exploited to use it as the basic building block of the hash function. It has been shown that the excellent randomness along with the inherent diffusion makes 2D CA an ideal candidate of Hash function. This work also focuses on the security analysis of the Hash function. We demonstrate Birthday attack and the analysis shows that the design is secure against this attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A CA having cycle length 2\(^n - 1\) is called maximum length CA.
- 2.
Strict Avalanche Criterion: If a change of a bit in the input sequence leads to the change of every output bits with a probability of 50\(\%\), then it is said to observe the Strict Avalanche Criteria.
- 3.
Bit independence Criterion: If a change in a bit i of the input sequence leads to change in the output bit j and k where j and k changes independently for all i, j and k then it is said to be Bit independence Criterion.
References
Bertoni, G. et al.: Keccak sponge function family main document. Submission to NIST (Round 2) 3: 30 (2009)
Ghosh, S., Sengupta, A., Saha, D., Chowdhury, D.R.: A scalable method for constructing non-linear cellular automata with period 2\(^n\)-1. In: Was, J., Sirakoulis, G.C., Bandini, S. (eds.) Cellular Automata. ACR. Lecture Notes in Computer Science, vol. 8751. Springer, Cham (2014)
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer (2002)
Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. Int. J. Wire. Mob. Comput. 2, 86–93 (2007)
Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The keccak sha-3 submission. Submission to NIST (Round 3) (2011)
Tomassini, M., Sipper, M., Perrenoud, M.: On the generation of high-quality random numbers by two-dimensional cellular automata. IEEE Trans. Comput. 49, 1146–1151 (2000). EPFL-ARTICLE-28657
Damgärd, I.B.: A Design Principle for Hash Functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416–427. Springer, Heidelberg (1990)
Merkle, R.C.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428–446. Springer, Heidelberg (1990)
Chabaud, F., Joux, A.: Differential collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56–71. Springer, Heidelberg (1998)
Kelsey, J., Kohno, T.: Herding hash functions and the nostradamus attack. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 183–200. Springer, Heidelberg (2006)
Jarkko KARI Mathematics Department, University of Turku, Finland ,Physica D: Nonlinear Phenomena Volume 45, Issues 1-3, 2 September 1990, Pages 379-385, (1990) , North-Holland
Daemen, J., Govaerts, R., Vandewalle, J.: A framework for the design of one-way hash functions including cryptanalysis of damgärd’s one-way function based on a cellular automaton. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 82–96. Springer, Heidelberg (1993)
Mihaljevi’c, M.J., Zheng, Y., Imai, H.: A cellular automaton based fast one-way hash function suitable for hardware implementation. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 217–233. Springer, Heidelberg (1998)
Cattell, K., Muzio, J.C.: Synthesis of one-dimensional linear hybrid cellular automata. IEEE Trans. Comput.-Aid. Des. Integr. Circuits Syst. 15, 325–335 (1996)
Meier, W., Staffelbach, O.: Analysis of pseudo random sequences generated by cellular automata. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 186–199. Springer, Heidelberg (1991)
Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-damgärd revisited: How to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430–448. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Haldar, T., Chowdhury, D.R. (2021). Design of Hash Function Using Two Dimensional Cellular Automata. In: Giri, D., Ho, A.T.S., Ponnusamy, S., Lo, NW. (eds) Proceedings of the Fifth International Conference on Mathematics and Computing. Advances in Intelligent Systems and Computing, vol 1170. Springer, Singapore. https://doi.org/10.1007/978-981-15-5411-7_3
Download citation
DOI: https://doi.org/10.1007/978-981-15-5411-7_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5410-0
Online ISBN: 978-981-15-5411-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)