DocumentCode :
3005126
Title :
The Glowworm hash: Increased speed and security for BBC unkeyed jam resistance
Author :
Baird, Leemon C. ; Carlisle, M.C. ; Bahn, W.L. ; Smith, Elena
Author_Institution :
Comput. Sci. Dept., US Air Force Acad., Colorado Springs, CO, USA
fYear :
2012
fDate :
Oct. 29 2012-Nov. 1 2012
Firstpage :
1
Lastpage :
6
Abstract :
Jam resistance for omnidirectional wireless networks is an important problem. Existing jam-resistant systems use a secret spreading sequence or secret hop sequence, or some other information that must be kept secret from the jammer. There is currently only one system for achieving such jam resistance without any shared secret: BBC coding. BBC requires the use of a hash function that is fast and secure, but ”secure” in a different sense than for standard cryptographic hashes. At MILCOM-2010, the Inchworm hash was presented [1], which is 300 times faster than SHA-1 for this application, and had no security flaws yet known. A variant of it, Inchworm-S, was also presented, that was intended to be more secure. We present an academic break of both Inchworm and Inchworm-S, and a practical break of the former. The advantage to the attacker is very small, but it is definitely detectable. We also present a new hash algorithm: Glowworm. Glowworm is simpler than Inchworm, and the same speed as Inchworm-S, while being more secure. We mathematically prove that it is immune to the theoretical attack we show for Inchworm and Inchworm-S. We also show empirically that it is immune to our empirical attack on Inchworm, even when the attack algorithm is run for much longer periods. In fact, we show that for our best attack software, it is indistinguishable from SHA-1, MD5, and all five SHA-3 candidates. We also mathematically prove that it has avalanche properties that prevent many other types of internal-state collisions and related attacks. We give a public domain, optimized, portable, C implementation of Glowworm. For incremental hashes as used in BBC codes, it can hash a string of arbitrary length in 11 clock cycles. That is not 11 cycles per bit or 11 cycles per byte. That is 11 cycles to hash the entire string, given that the current string being hashed differs from the last in only an addition or deletion of its last bit. Finally, we discuss our implementation of- Glowworm in a Field Programmable Gate Array (FPGA), where it runs in just one clock cycle per string, using only a modest amount of resources.1
Keywords :
cryptography; field programmable gate arrays; jamming; network coding; radio networks; BBC coding; BBC unkeyed jam resistance; FPGA; Glowworm hash algorithm; Inchworm-S; SHA-1; SHA-3 candidates; attack algorithm; attack software; cryptographic hashes; field programmable gate array; internal-state collisions; jam-resistant systems; omnidirectional wireless networks; secret hop sequence; secret spreading sequence; Jamming; Logic gates; Receivers; Resistance; Security; Shift registers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012
Conference_Location :
Orlando, FL
ISSN :
2155-7578
Print_ISBN :
978-1-4673-1729-0
Type :
conf
DOI :
10.1109/MILCOM.2012.6415738
Filename :
6415738
Link To Document :
بازگشت