Determining Minimum Hash Width for Hash Chains

Proceedings of the Third Central European Cybersecurity Conference(2019)

引用 2|浏览0
暂无评分
摘要
Cryptographic hash functions are used in authentication, and repeated application in hash chains is used in communication protocols. In embedded devices, the width of hash values and the associated effort to evaluate the hash function is crucial, and hence the hash values should be as short as possible but should still be sufficient to guarantee the required level of security. We present a new proof for a known result by Flajolet and Odlyzko (Euro-crypt 1989), using only elementary combinatoric and probabilistic arguments. Using this result, we derive a bound on the expected number of hash values still reachable after a given number of steps in the hash chain, so that given any two of the three parameters hash chain length, width of the hash value, and security level, the remaining parameter can be computed. Furthermore, we illustrate how to "refresh" a hash chain to increase the number of reachable hash values if the initial seed is long enough. Based on this, we present a scheme that allows reduced width of hash values, and thus reduced energy consumption in the device, for a hash chain of similar length and similar security level. We illustrate our findings with experiments.
更多
查看译文
关键词
Cryptographic Hash Function, Hash Chain, Tradeoff
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要