DocumentCode
429735
Title
Using the BCH construction to generate robust linear hash functions
Author
Grossman, J.P. ; Jakab, Levente
Author_Institution
Configuresoft, Inc., Colorado Springs, CO, USA
fYear
2004
fDate
24-29 Oct. 2004
Firstpage
250
Lastpage
253
Abstract
Providing a single hash function for use across multiple applications is challenging due to the fact that different applications require different sizes of hashed values. An application-independent hash function must be robust in the sense that it must maintain good characteristics independent of the number of output bits which are used. In this paper we show how the BCH construction can be used to construct a single n→m bit linear hash function with the property that that the n→m´ bit subhash functions obtained by discarding the upper m - m´ output bits all have provably good collision avoidance properties. We apply this technique to the construction of a 256→128 bit hash function. We find that of the 256→m´ subhashes, over 78% have optimal minimum collision distances and all but one have a minimum collision distance within 2 of optimal.
Keywords
BCH codes; binary codes; file organisation; linear codes; minimisation; BCH construction; collision avoidance; optimal minimum collision distances; robust linear hash functions; subhash functions; Application software; Collision avoidance; Computer science; Cryptography; Hamming distance; Hardware; Linear code; Memory management; Robustness; Springs;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory Workshop, 2004. IEEE
Print_ISBN
0-7803-8720-1
Type
conf
DOI
10.1109/ITW.2004.1405309
Filename
1405309
Link To Document