DocumentCode :
2186433
Title :
Token Free Bounded Delay Codes and Hash Iteration
Author :
Ditu, Sebastian Codrin
Author_Institution :
Fac. of Comput. Sci., Alexandru Ioan Cuza Univ., Iasi, Romania
fYear :
2013
fDate :
23-26 Sept. 2013
Firstpage :
391
Lastpage :
397
Abstract :
A hash iteration technique takes as input a hash compression function which works on fixed length binary strings and outputs a hash function which works on arbitrary length binary strings. In this paper we introduce token-free bounded delay codes and then use them to define a hash iteration technique. The newly created schema, when applied to a hash compression function, preserves the following security properties: preimage resistance (Pre), always preimage-resistance (aPre), everywhere preimage-resistance (ePre) and collision-resistance (Coll). The proofs for the preservation of the second-preimage resistance (Sec), always second-preimage resistance (aSec), and everywhere second-preimage resistance (eSec) are part of our future work. Comparisons with other iteration techniques are also provided.
Keywords :
cryptography; data compression; iterative methods; always preimage-resistance; collision-resistance; everywhere preimage-resistance; hash compression function; hash iteration technique; preimage resistance; token free bounded delay codes; Authentication; Complexity theory; Cryptography; Delays; Equations; Resistance; bounded delay codes; hash iteration; token-free;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2013 15th International Symposium on
Conference_Location :
Timisoara
Print_ISBN :
978-1-4799-3035-7
Type :
conf
DOI :
10.1109/SYNASC.2013.58
Filename :
6821175
Link To Document :
بازگشت