A POLYNOMIAL BASED HASHING ALGORITHM

V. Kumar Murty, Nikolajs Volkovs

Abstract

The aim of this article is to describe a new hash algorithm using polynomials over finite fields. It runs at speeds comparable to SHA-3. Hardware implementations seem to run at significantly faster speeds, namely at 1.8 Gb/sec on an FPGA. Unlike most other existing hash algorithms, our construction does not follow the Damgaard-Merkle philosophy. The hash has several attractive features in terms of its flexibility. In particular, the length of the hash is a parameter that can be set at the outset. Moreover, the estimated degree of collision resistance is measured in terms of another parameter whose value can be varied.

References

  1. Aiello, W., Haber, S., and Venkatesan, R. (1998). New constructions for secure hash functions (Extended abstract). In Fast Software Encryption, LNCS vol.1372, pages 150-167. Springer Verlag, Berlin.
  2. Damgaard, I. (1989). A design principle for hash functions. In Advances in Cryptology, LNCS 435, pages 416-427. Springer Verlag, Berlin.
  3. Hankerson, D., Menezes, A., and Vanstone, S. (2004). Guide to Elliptic curve cryptography. SpringerVerlag, New York.
  4. Krovetz,T., and Rogoway,P. (2000). Fast universal hashing with small keys and no preprocessing: the PolyR construction. In Information Security and Cryptology ICICS 2000, LNCS vol. 2015, pages73-89. SpringerVerlag, Berlin.
  5. Mal'cev, A.I. (1970) Algorithms and recursive functions. Wolters-Noordhoff Pub.Co.
  6. Menezes, A., van Oorschot, P.C., and Vanstone, S. (1997) Handbook of Applied Cryptography. CRC Press.
  7. Merkle, R. (1989). A Certified Digital Signature. In Advances in Cryptology, LNCS 435, pages 218-238. Springer Verlag, Berlin.
  8. Murty, V. Kumar, and Volkovs, N. (2008). ERINDALE: A polynomial based hashing algorithm. In preparation.
  9. National Institute of Standards and Technology (2006). Second NIST Workshop on Hash functions. http://csrc.nist.gov/groups/ST/hash/second workshop.html, August 24-25, 2006.
Download


Paper Citation


in Harvard Style

Kumar Murty V. and Volkovs N. (2008). A POLYNOMIAL BASED HASHING ALGORITHM . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 103-106. DOI: 10.5220/0001929501030106


in Bibtex Style

@conference{secrypt08,
author={V. Kumar Murty and Nikolajs Volkovs},
title={A POLYNOMIAL BASED HASHING ALGORITHM},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={103-106},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001929501030106},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - A POLYNOMIAL BASED HASHING ALGORITHM
SN - 978-989-8111-59-3
AU - Kumar Murty V.
AU - Volkovs N.
PY - 2008
SP - 103
EP - 106
DO - 10.5220/0001929501030106