Strengthening Short Hash Values
نویسنده
چکیده
The number of bits in a cryptographic one-way hash value is usually selected so that brute-force search for a second pre-image is impossible. Sometimes, application requirements force one to use shorter and, thus, weaker hash values. Over years, increases in the attacker’s computational capacity will render any protocol that depends on such hashes insecure. In this paper, we present a simple technique called hash extension to counter the effect of increasing CPU speed. The idea is to increase the absolute computational cost for both the attacker and for the defender by some factor while keeping the ratio of the two constant. The hash-extension technique is suitable for protocols where the same hash value is verified multiple times because the defender incurs the additional cost only when the hash is created for the first time. We explain how to automatically select the critical parameters in the hash-extension algorithm and discuss its applications in cryptographically generated network addresses and in manual authentication protocols.
منابع مشابه
XSA-strengthening: Strengthening MD5 and Other Iterated Hash Functions Through Variable-length External Message Expansion
In recent years, it has been demonstrated that collisions can be systematically constructed for some popular cryptographic hash algorithms, such as MD5 and SHA-1. Various ways of enhancing these hash functions via message pre-processing or external message expansion have been proposed to make them resistant to known collision attacks. Message preprocessing/expansion is a way of creating a new h...
متن کاملTradeoff tables for compression functions: how to invert hash values
Hash functions are one of the ubiquitous cryptographic functions used widely for various applications such as digital signatures, data integrity, authentication protocols, MAC algorithms, RNGs, etc. Hash functions are supposed to be one-way, i.e., preimage resistant. One interesting property of hash functions is that they process arbitrary-length messages into fixed-length outputs. In general, ...
متن کاملAn Improved Hash Function Based on the Tillich-Zémor Hash Function
Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.
متن کاملRank Subspace Learning for Compact Hash Codes
The era of Big Data has spawned unprecedented interests in developing hashing algorithms for efficient storage and fast nearest neighbor search. Most existing work learn hash functions that are numeric quantizations of feature values in projected feature space. In this work, we propose a novel hash learning framework that encodes feature’s rank orders instead of numeric values in a number of op...
متن کاملCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کامل