• DocumentCode
    429735
  • Title

    Using the BCH construction to generate robust linear hash functions

  • Author

    Grossman, J.P. ; Jakab, Levente

  • Author_Institution
    Configuresoft, Inc., Colorado Springs, CO, USA
  • fYear
    2004
  • fDate
    24-29 Oct. 2004
  • Firstpage
    250
  • Lastpage
    253
  • Abstract
    Providing a single hash function for use across multiple applications is challenging due to the fact that different applications require different sizes of hashed values. An application-independent hash function must be robust in the sense that it must maintain good characteristics independent of the number of output bits which are used. In this paper we show how the BCH construction can be used to construct a single n→m bit linear hash function with the property that that the n→m´ bit subhash functions obtained by discarding the upper m - m´ output bits all have provably good collision avoidance properties. We apply this technique to the construction of a 256→128 bit hash function. We find that of the 256→m´ subhashes, over 78% have optimal minimum collision distances and all but one have a minimum collision distance within 2 of optimal.
  • Keywords
    BCH codes; binary codes; file organisation; linear codes; minimisation; BCH construction; collision avoidance; optimal minimum collision distances; robust linear hash functions; subhash functions; Application software; Collision avoidance; Computer science; Cryptography; Hamming distance; Hardware; Linear code; Memory management; Robustness; Springs;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory Workshop, 2004. IEEE
  • Print_ISBN
    0-7803-8720-1
  • Type

    conf

  • DOI
    10.1109/ITW.2004.1405309
  • Filename
    1405309