A trade-off between collision probability and key size in universal hashing using polynomials

نویسنده

  • Palash Sarkar
چکیده

Let IF be a finite field and suppose that a single element of IF is used as an authenticator (or tag). Further, suppose that any message consists of at most L elements of IF. For this setting, usual polynomial based universal hashing achieves a collision bound of (L− 1)/|IF| using a single element of IF as the key. The well-known multi-linear hashing achieves a collision bound of 1/|IF| using L elements of IF as the key. In this work, we present a new universal hash function which achieves a collision bound of mdlogm Le/|IF|, m ≥ 2, using 1 + dlogm Le elements of IF as the key. This provides a new trade-off between key size and collision probability for universal hash functions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Short-output universal hash functions and their use in fast and secure message authentication

Message authentication codes usually require the underlining universal hash functions to have a long output so that the probability of successfully forging messages is low enough for cryptographic purposes. To take advantage of fast operation on word-size parameters in modern processors, long-output universal hashing schemes can be securely constructed by concatenating several instances of shor...

متن کامل

A Hybrid Approach for Probabilistic Inference using Random Projections

We introduce a new meta-algorithm for probabilistic inference in graphical models based on random projections. The key idea is to use approximate inference algorithms for an (exponentially) large number of samples, obtained by randomly projecting the original statistical model using universal hash functions. In the case where the approximate inference algorithm is a variational approximation, t...

متن کامل

Tiny families of functions with random properties: A quality-size trade-off for hashing

We present three explicit constructions of hash functions, which exhibit a trade-off between the size of the family (and hence the number of random bits needed to generate a member of the family), and the quality (or error parameter) of the pseudo-random property it achieves. Unlike previous constructions, most notably universal hashing, the size of our families is essentially independent of th...

متن کامل

New combinatorial bounds for universal hash functions

Using combinatorial analysis, we introduce a new lower bound for the key length in an almost universal hash function, which is tighter than another similar bound derived from a well-studied equivalence between almost universal hashes and error-correcting codes. To the best of our knowledge, this is the first time that combinatorial analysis has been demonstrated to yield a better universal hash...

متن کامل

An 80Gbps FPGA Implementation of a Universal Hash Function based Message Authentication Code

We developed an architecture optimization technique called divide-and-concatenate and applied it to a cryptographic message authentication code (MAC). This is based on two key observations: (i) The area of a multiplier and associated data path decreases quadratically and their speeds increase gradually as their operand size is reduced. (ii) Two w-bit universal hash function data paths (each wit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009