loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Yuto Nakano ; Jun Kurihara ; Shinsaku Kiyomoto and Toshiaki Tanaka

Affiliation: KDDI R&D Laboratories Inc., Japan

Keyword(s): Hash function, Stream cipher, Collision resistance, Second preimage resistance, Preimage resistance.

Related Ontology Subjects/Areas/Topics: Cryptographic Techniques and Key Management ; Information and Systems Security ; Mobile Code & Agent Security ; Smart Card Security

Abstract: Hash functions using stream ciphers as components perform fast on a variety of platforms. However, the security and the design policy of stream-cipher-based hash functions (SCHs) have not yet been studied sufficiently. In this paper, we analyze its design criteria based on a ideal function of SCHs. First, we show that attacks against a stream cipher can also be threats against SCHs. Then we discuss the security on each phase of SCH; message injection, blank rounds, and hash generation with this function. Finally we derive the necessary conditions on the stream cipher function for an SCH to be secure.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 52.87.200.112

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Nakano, Y.; Kurihara, J.; Kiyomoto, S. and Tanaka, T. (2010). ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS. In Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT; ISBN 978-989-8425-18-8; ISSN 2184-3236, SciTePress, pages 334-343. DOI: 10.5220/0002939703340343

@conference{secrypt10,
author={Yuto Nakano. and Jun Kurihara. and Shinsaku Kiyomoto. and Toshiaki Tanaka.},
title={ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT},
year={2010},
pages={334-343},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002939703340343},
isbn={978-989-8425-18-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT
TI - ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS
SN - 978-989-8425-18-8
IS - 2184-3236
AU - Nakano, Y.
AU - Kurihara, J.
AU - Kiyomoto, S.
AU - Tanaka, T.
PY - 2010
SP - 334
EP - 343
DO - 10.5220/0002939703340343
PB - SciTePress