DocumentCode
105050
Title
Newmultivariate hash function quadratic polynomials multiplying linear polynomials
Author
Youjiao Zou ; Wenping Ma ; Zhanjun Ran ; Shangping Wang
Author_Institution
State Key Lab. of Integrated Service Networks, Xidian Univ., Xi´an, China
Volume
7
Issue
3
fYear
2013
fDate
Sept. 2013
Firstpage
181
Lastpage
188
Abstract
In this study the authors propose a new multivariate hash function with HAsh Iterative FrAmework framework which we call the hash function quadratic polynomials multiplying linear polynomials (QML). The new hash function is made of cubic polynomials which are the products of quadratic polynomials and linear polynomials. The authors design the quadratic-polynomial part of the compression function based on the centre map of the multivariate public key cryptosystem Matsumoto-Imai cryptosystem (MI). The hash function QML can keep the three cryptography properties and be immune to the pre-image attack, second pre-image attack, collision attack, differential attack and algebraic attack. The required memory storage is about 50% of the one which is built of the cubic polynomials and their coefficients are random. On the avalanche effect, by experiments the authors get the result that about one half of the output bits are different when one input bit is changed randomly. The one-round diffusion of the hash function QML is twice of that of Blake. Also the authors simplify the matrixes of the new hash function, analyse the rationality and show the comparable data. Finally, the authors give the advice to the parameters of the new hash function and summarise the paper.
Keywords
iterative methods; polynomials; public key cryptography; storage management; Blake; algebraic attack; centre map-based compression function; collision attack; cryptography properties; cubic polynomials; differential attack; hash function QML; hash iterative framework; memory storage; multivariate hash function quadratic polynomials multiplying linear polynomials; multivariate public key cryptosystem MI; one-round diffusion; second preimage attack;
fLanguage
English
Journal_Title
Information Security, IET
Publisher
iet
ISSN
1751-8709
Type
jour
DOI
10.1049/iet-ifs.2012.0035
Filename
6587873
Link To Document