A trade-off between collision probability and key size in universal hashing using polynomials
نویسنده
چکیده
Let IF be a finite field and suppose that a single element of IF is used as an authenticator (or tag). Further, suppose that any message consists of at most L elements of IF. For this setting, usual polynomial based universal hashing achieves a collision bound of (L− 1)/|IF| using a single element of IF as the key. The well-known multi-linear hashing achieves a collision bound of 1/|IF| using L elements of IF as the key. In this work, we present a new universal hash function which achieves a collision bound of mdlogm Le/|IF|, m ≥ 2, using 1 + dlogm Le elements of IF as the key. This provides a new trade-off between key size and collision probability for universal hash functions.
منابع مشابه
Short-output universal hash functions and their use in fast and secure message authentication
Message authentication codes usually require the underlining universal hash functions to have a long output so that the probability of successfully forging messages is low enough for cryptographic purposes. To take advantage of fast operation on word-size parameters in modern processors, long-output universal hashing schemes can be securely constructed by concatenating several instances of shor...
متن کاملA Hybrid Approach for Probabilistic Inference using Random Projections
We introduce a new meta-algorithm for probabilistic inference in graphical models based on random projections. The key idea is to use approximate inference algorithms for an (exponentially) large number of samples, obtained by randomly projecting the original statistical model using universal hash functions. In the case where the approximate inference algorithm is a variational approximation, t...
متن کاملTiny families of functions with random properties: A quality-size trade-off for hashing
We present three explicit constructions of hash functions, which exhibit a trade-off between the size of the family (and hence the number of random bits needed to generate a member of the family), and the quality (or error parameter) of the pseudo-random property it achieves. Unlike previous constructions, most notably universal hashing, the size of our families is essentially independent of th...
متن کاملNew combinatorial bounds for universal hash functions
Using combinatorial analysis, we introduce a new lower bound for the key length in an almost universal hash function, which is tighter than another similar bound derived from a well-studied equivalence between almost universal hashes and error-correcting codes. To the best of our knowledge, this is the first time that combinatorial analysis has been demonstrated to yield a better universal hash...
متن کاملAn 80Gbps FPGA Implementation of a Universal Hash Function based Message Authentication Code
We developed an architecture optimization technique called divide-and-concatenate and applied it to a cryptographic message authentication code (MAC). This is based on two key observations: (i) The area of a multiplier and associated data path decreases quadratically and their speeds increase gradually as their operand size is reduced. (ii) Two w-bit universal hash function data paths (each wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009