HaF - A New Family of Hash Functions
Tomasz Bilski, Krzysztof Bucholc, Anna Grocholewska-Czurylo, Janusz Stokłosa
2012
Abstract
Paper presents a family of parameterized hash functions allowing for flexibility between security and performance. The family consists of three basic hash functions: HaF-256, HaF-512 and HaF-1024 with message digests equal to 256, 512 and 1024 bits, respectively. Details of functions' structure are presented. Method for obtaining function's S-box is described along with the rationale behind it. Security considerations are discussed.
References
- Biham E., Dunkelman O., 2007. A framework for iterative hash functions - HAIFA, NIST 2nd Hash Function Workshop, Santa Barbara, August 2006; also: Cryptology ePrint Archive: Report 2007/278, http://eprint.iacr.org/2007/278.
- Daemen J., Rijmen V., 1999. AES Proposal: Rijndael, AES'99, http://csrc.nist.gov/CryptoToolkit/aes/ rijndael/1999
- Fuller J., Millan W., 2002. On Linear Redundancy in the AES S-Box, http://eprint.iacr.org/2002/111.
- Fuller J., Millan W., 2003. On Linear Redundancy in SBoxes, FSE 2003, LNCS 2887, 74-86, Springer 2003.
- Janicka-Lipska I., Stoklosa J., 2004. Boolean feedback functions for full-length nonlinear shift registers. Journal of Telecommunications and Information Technology, 2004, 5, 28-30.
- Lai X., Massey J. L., 1991. A proposal for a new block encryption standard. Damgård I. B. (ed.), Advances in Cryptology - EUROCRYPT 7890. LNCS 473, Springer, Berlin, 1991, 389-404.
- Menezes A. J., van Oorschot P.C., Vanstone S. A., 1997. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL,1997.
- Rueppel R. A., 1986. Analysis and Design of Stream Ciphers. Springer, Berlin, 1986.
- Stoklosa J., 1995. Integrity of data: FSR-hash. Bubnicki Z. (ed.), Proceedings of the 12th International Conference on Systems Science. Oficyna Wydawnicza Politechniki Wroclawskiej, Wroclaw, 1995, 120-125.
- Aumasson J.P., Henzen L., Meier W., C.-W. Phan R. C.- W, 2011. SHA-3 proposal BLAKE. Submission to NIST, version 1.4, January 11, 2011,
- Regenscheid A., Perlner R., Cjen Chang S., Kelsey J., Nandi M., Paul S., 2009. Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition, Technical Report 7620 NIST (September 2009), http://csrc.nist.gov/groups/ST/hash/sha-3/ Round1/documents/sha3_NISTIR7620.pdf
Paper Citation
in Harvard Style
Bilski T., Bucholc K., Grocholewska-Czurylo A. and Stokłosa J. (2012). HaF - A New Family of Hash Functions . In Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS, ISBN 978-989-8565-00-6, pages 188-195. DOI: 10.5220/0003825401880195
in Bibtex Style
@conference{peccs12,
author={Tomasz Bilski and Krzysztof Bucholc and Anna Grocholewska-Czurylo and Janusz Stokłosa},
title={HaF - A New Family of Hash Functions},
booktitle={Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,},
year={2012},
pages={188-195},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003825401880195},
isbn={978-989-8565-00-6},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,
TI - HaF - A New Family of Hash Functions
SN - 978-989-8565-00-6
AU - Bilski T.
AU - Bucholc K.
AU - Grocholewska-Czurylo A.
AU - Stokłosa J.
PY - 2012
SP - 188
EP - 195
DO - 10.5220/0003825401880195