On the Minimum Number of Multiplications Necessary for Universal Hash Constructions
نویسنده
چکیده
Universal hashes are usually based on some multivariate polynomials in message and key blocks (elements of some underlying ring R). These are implemented by using multiplications (which dominates the computational time) and additions. Two such hashes are pseudo dotproduct (PDP) hash and Bernstein-Rabin-Winograd (BRW) hash which require n/2 multiplications for n message blocks. In this paper we observe that these are optimum in number of multiplications by showing that at least n/2 multiplications or non-linear operations are necessary. We also extend this lower bound for any multi-block hash construction, i.e., the hash output is an element of R. We show that d block hash outputs requires at least (d− 1) + n/2 non-linear operations. The widely used Toeplitz construction for d block hash output requires nd/2 multiplications when it is applied for PDP. In this paper, we propose a d-block universal hash EHC requiring (d− 1) + n/2 multiplications and hence it is optimum and the bound is tight. Our construction is roughly d times faster than Toeplitz construction. Moreover, it has similar parllelizibility and key size as in Toeplitz construction.
منابع مشابه
On the Minimum Number of Multiplications Necessary for Universal Hash Functions
Let d ≥ 1 be an integer and R1 be a finite ring whose elements are called block. A d-block universal hash over R1 is a vector of d multivariate polynomials in message and key block such that the maximum differential probability of the hash function is “low”. Two such single block hashes are pseudo dot-product (PDP) hash and BernsteinRabin-Winograd (BRW) hash which require n 2 multiplications fo...
متن کاملWeak-Key Analysis of POET
We evaluate the security of the recently proposed authenticated encryption scheme POET with regard to weak keys when its universal hash functions are instantiated with finite field multiplications. We give explicit constructions for weak key classes not covered by POET’s weak key testing strategy, and demonstrate how to leverage them to obtain universal forgeries.
متن کاملA New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices
A new multi-linear universal hash family is described. Messages are sequences over a finite field IFq while keys are sequences over an extension field IFqn . A linear map ψ from IFqn to itself is used to compute the output digest. Of special interest is the case q = 2. For this case, we show that there is an efficient way to implement ψ using a tower field representation of IFqn . Such a ψ corr...
متن کاملSquare Hash: Fast Message Authentication Via Optimized Universal Hash Functions?
This paper introduces two new ideas in the construction of fast universal hash functions geared towards the task of message authen-tication. First, we describe a simple but novel family of universal hash functions that is more eecient than many standard constructions. We compare our hash functions to the MMH family studied by Halevi and Krawczyk 13]. All the main techniques used to optimize MMH...
متن کاملSQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions
This paper introduces two new ideas in the construction of fast universal hash functions geared towards the task of message authen-tication. First, we describe a simple but novel family of universal hash functions that is more eecient than many standard constructions. We compare our hash functions to the MMH family studied by Halevi and Krawczyk 12]. All the main techniques used to optimize MMH...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013