Abstract
In this paper a new 2m-bit iterated hash function based on a m-bit block cipher with a 2m-bit key is proposed. The hash round function in the new scheme utilizes a single underlying block cipher and can completely resist target attack, collision attack and semi-free-start collision attack. The new scheme can be expected to have ideal computational security against five attacks when the underlying cipher is assumed to have no weakness.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
Davies, R., Price, W.: Digital signature-an Update. Proc. of International Conference on Computer Communications, Sydney, Oct. 1984, Elsevier, North-Holland, (1985)843–847.
Matyas, S., Meyer, C., Oseas, J.: Generating strong one-way functions with cryptographic algorithm. IBM Technical Disclosure Bulletin, Vol. 27, No.10A, (1985)5658–5659.
Preneel, B., Bosselaers, A., Govaerts, R., Vandewalle, J.: Collision-free hashfunctions based on blockcipher algorithm. Proc. of 1989 International Carnahan Conference on Security Technology, (1989)203–210.
Quisquater, J., Girault, M.: 2n-bit hash functions using n-bit symmetric blcok cipher algorithm. Advances in Cryptology, Proc. of EUROCRYPT'89, Lecture Notes in Computer Science 434 (1990)102–109.
Brown, L., Pieprzyk, J., Seberry, J.: LOKI-a cryptographic primitive for authentication and secrecy applications. Advances in Cryptology, Proc. of AUSCRYPT'90, Lecture Notes in Computer Science 453 (1990)229–236.
Merkle, R.: One way hash functions and DES. Advances in Cryptology, Proc. of CRYPTO'89, Lecture Notes in Computer Science 435 (1990)428–446.
Meyer, C., Schilling, M.: Secure program code with modification detection code. Proc. of SECURICOM'88 SEDEP.8, Rue De la Michodies, 75002, Paris, France, (1988)111–130.
Lai, X., Massey, J.: A proposal for a new block encryption standard. Advances in Cryptology, Proc. of EUROCRYPT'90, Lecture Notes in Computer Science 473 (1991)389–404.
Lai, X.: On the design and security of block cipher. ETH Series in Information Processing, V.1, Konstanz: Hartung-Gorre Verlag, 1992.
Lai, X., Massey, J.: Hash functions based on block ciphers. Advances in Cryptology, Proc. of EUROCRYPT'92, Lecture Notes in Computer Science 658 (1993)55–70.
Damgaard, I.: A design principle for hash functions. Advances in Cryptology, Proc. of CRYPTO'89, Lecture Notes in Computer Science 435 (1990)416–427.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yi, X., Lam, KY. (1997). A new hash function based on block cipher. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027921
Download citation
DOI: https://doi.org/10.1007/BFb0027921
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63232-0
Online ISBN: 978-3-540-69237-9
eBook Packages: Springer Book Archive