On the Minimum Number of Multiplications Necessary for Universal Hash Constructions

نویسنده

  • Mridul Nandi
چکیده

Universal hashes are usually based on some multivariate polynomials in message and key blocks (elements of some underlying ring R). These are implemented by using multiplications (which dominates the computational time) and additions. Two such hashes are pseudo dotproduct (PDP) hash and Bernstein-Rabin-Winograd (BRW) hash which require n/2 multiplications for n message blocks. In this paper we observe that these are optimum in number of multiplications by showing that at least n/2 multiplications or non-linear operations are necessary. We also extend this lower bound for any multi-block hash construction, i.e., the hash output is an element of R. We show that d block hash outputs requires at least (d− 1) + n/2 non-linear operations. The widely used Toeplitz construction for d block hash output requires nd/2 multiplications when it is applied for PDP. In this paper, we propose a d-block universal hash EHC requiring (d− 1) + n/2 multiplications and hence it is optimum and the bound is tight. Our construction is roughly d times faster than Toeplitz construction. Moreover, it has similar parllelizibility and key size as in Toeplitz construction.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Minimum Number of Multiplications Necessary for Universal Hash Functions

Let d ≥ 1 be an integer and R1 be a finite ring whose elements are called block. A d-block universal hash over R1 is a vector of d multivariate polynomials in message and key block such that the maximum differential probability of the hash function is “low”. Two such single block hashes are pseudo dot-product (PDP) hash and BernsteinRabin-Winograd (BRW) hash which require n 2 multiplications fo...

متن کامل

Weak-Key Analysis of POET

We evaluate the security of the recently proposed authenticated encryption scheme POET with regard to weak keys when its universal hash functions are instantiated with finite field multiplications. We give explicit constructions for weak key classes not covered by POET’s weak key testing strategy, and demonstrate how to leverage them to obtain universal forgeries.

متن کامل

A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices

A new multi-linear universal hash family is described. Messages are sequences over a finite field IFq while keys are sequences over an extension field IFqn . A linear map ψ from IFqn to itself is used to compute the output digest. Of special interest is the case q = 2. For this case, we show that there is an efficient way to implement ψ using a tower field representation of IFqn . Such a ψ corr...

متن کامل

Square Hash: Fast Message Authentication Via Optimized Universal Hash Functions?

This paper introduces two new ideas in the construction of fast universal hash functions geared towards the task of message authen-tication. First, we describe a simple but novel family of universal hash functions that is more eecient than many standard constructions. We compare our hash functions to the MMH family studied by Halevi and Krawczyk 13]. All the main techniques used to optimize MMH...

متن کامل

SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions

This paper introduces two new ideas in the construction of fast universal hash functions geared towards the task of message authen-tication. First, we describe a simple but novel family of universal hash functions that is more eecient than many standard constructions. We compare our hash functions to the MMH family studied by Halevi and Krawczyk 12]. All the main techniques used to optimize MMH...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013