On the Minimum Number of Multiplications Necessary for Universal Hash Functions

نویسنده

  • Mridul Nandi
چکیده

Let d ≥ 1 be an integer and R1 be a finite ring whose elements are called block. A d-block universal hash over R1 is a vector of d multivariate polynomials in message and key block such that the maximum differential probability of the hash function is “low”. Two such single block hashes are pseudo dot-product (PDP) hash and BernsteinRabin-Winograd (BRW) hash which require n 2 multiplications for n message blocks. The Toeplitz construction and d independent invocations of PDP are d-block hash outputs which require d× n 2 multiplications. However, here we show that at least (d− 1) + n 2 multiplications are necessary to compute a universal hash over n message blocks. We construct a dblock universal hash, called EHC, which requires the matching (d−1)+ n 2 multiplications for d ≤ 4. Hence it is optimum and our lower bound is tight when d ≤ 4. It has similar parllelizibility, key size like Toeplitz and so it can be used as a light-weight universal hash.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Minimum Number of Multiplications Necessary for Universal Hash Constructions

Universal hashes are usually based on some multivariate polynomials in message and key blocks (elements of some underlying ring R). These are implemented by using multiplications (which dominates the computational time) and additions. Two such hashes are pseudo dotproduct (PDP) hash and Bernstein-Rabin-Winograd (BRW) hash which require n/2 multiplications for n message blocks. In this paper we ...

متن کامل

A Fast Single-Key Two-Level Universal Hash Function

Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate such hash functions require ` − 1 field multiplications for hashing a message consisting of ` blocks where each block is one field element. A faster method is based on the class of Bernstein-Rabin-Winograd (BRW) polynomials which require b`/2c multiplications and blg...

متن کامل

Generating short-output digest functions

This paper introduces two related methods of generating a new cryptographic primitive termed digest which has similarities to -balanced and almost universal hash functions. Digest functions, however, typically have a very short output, e.g. 16-64 bits, and hence they are not required to resist collision and inversion attacks. They also have the potential to be very fast to compute relative to l...

متن کامل

Compressed Image Hashing using Minimum Magnitude CSLBP

Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...

متن کامل

Strongly Universal String Hashing is Fast

We present fast strongly universal string hashing families: they can process data at a rate of 0.2 CPU cycle per byte. Maybe surprisingly, we find that these families— though they requires a large buffer of random numbers—are often faster than popular hash functions with weaker theoretical guarantees. Moreover, conventional wisdom is that hash functions with fewer multiplications are faster. Ye...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014