HaF - A New Family of Hash Functions

Tomasz Bilski, Krzysztof Bucholc, Anna Grocholewska-Czurylo, Janusz Stokłosa

2012

Abstract

Paper presents a family of parameterized hash functions allowing for flexibility between security and performance. The family consists of three basic hash functions: HaF-256, HaF-512 and HaF-1024 with message digests equal to 256, 512 and 1024 bits, respectively. Details of functions' structure are presented. Method for obtaining function's S-box is described along with the rationale behind it. Security considerations are discussed.

References

  1. Biham E., Dunkelman O., 2007. A framework for iterative hash functions - HAIFA, NIST 2nd Hash Function Workshop, Santa Barbara, August 2006; also: Cryptology ePrint Archive: Report 2007/278, http://eprint.iacr.org/2007/278.
  2. Daemen J., Rijmen V., 1999. AES Proposal: Rijndael, AES'99, http://csrc.nist.gov/CryptoToolkit/aes/ rijndael/1999
  3. Fuller J., Millan W., 2002. On Linear Redundancy in the AES S-Box, http://eprint.iacr.org/2002/111.
  4. Fuller J., Millan W., 2003. On Linear Redundancy in SBoxes, FSE 2003, LNCS 2887, 74-86, Springer 2003.
  5. Janicka-Lipska I., Stoklosa J., 2004. Boolean feedback functions for full-length nonlinear shift registers. Journal of Telecommunications and Information Technology, 2004, 5, 28-30.
  6. Lai X., Massey J. L., 1991. A proposal for a new block encryption standard. Damgård I. B. (ed.), Advances in Cryptology - EUROCRYPT 7890. LNCS 473, Springer, Berlin, 1991, 389-404.
  7. Menezes A. J., van Oorschot P.C., Vanstone S. A., 1997. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL,1997.
  8. Rueppel R. A., 1986. Analysis and Design of Stream Ciphers. Springer, Berlin, 1986.
  9. Stoklosa J., 1995. Integrity of data: FSR-hash. Bubnicki Z. (ed.), Proceedings of the 12th International Conference on Systems Science. Oficyna Wydawnicza Politechniki Wroclawskiej, Wroclaw, 1995, 120-125.
  10. Aumasson J.P., Henzen L., Meier W., C.-W. Phan R. C.- W, 2011. SHA-3 proposal BLAKE. Submission to NIST, version 1.4, January 11, 2011,
  11. Regenscheid A., Perlner R., Cjen Chang S., Kelsey J., Nandi M., Paul S., 2009. Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition, Technical Report 7620 NIST (September 2009), http://csrc.nist.gov/groups/ST/hash/sha-3/ Round1/documents/sha3_NISTIR7620.pdf
Download


Paper Citation


in Harvard Style

Bilski T., Bucholc K., Grocholewska-Czurylo A. and Stokłosa J. (2012). HaF - A New Family of Hash Functions . In Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS, ISBN 978-989-8565-00-6, pages 188-195. DOI: 10.5220/0003825401880195


in Bibtex Style

@conference{peccs12,
author={Tomasz Bilski and Krzysztof Bucholc and Anna Grocholewska-Czurylo and Janusz Stokłosa},
title={HaF - A New Family of Hash Functions},
booktitle={Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,},
year={2012},
pages={188-195},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003825401880195},
isbn={978-989-8565-00-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,
TI - HaF - A New Family of Hash Functions
SN - 978-989-8565-00-6
AU - Bilski T.
AU - Bucholc K.
AU - Grocholewska-Czurylo A.
AU - Stokłosa J.
PY - 2012
SP - 188
EP - 195
DO - 10.5220/0003825401880195