Making hash functions from block ciphers secure and efficient by using convolutional codes

Toru Inoue, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

We improve Knudsen-Preneel's constructions for cryptographic hash functions based on block ciphers with error correcting codes. We first modify to extend original constructions, which are effective only for non-binary codes, to the case with binary codes (e.g. BCH codes). We also revise the original method by introducing convolutional codes, whereas the previous adapts only block codes. This reduces the circuit complexity of the hardware-implementation 1/N times in terms of the number of (Davies-Meyer's) module functions than that based block error correcting codes.

Original languageEnglish
Title of host publicationPublic Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings
EditorsHideki Imai, Yuliang Zheng
PublisherSpringer Verlag
Pages391-404
Number of pages14
ISBN (Print)3540669671, 9783540669678
Publication statusPublished - Jan 1 2000
Event3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000 - Melbourne, Australia
Duration: Jan 18 2000Jan 20 2000

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1751
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000
CountryAustralia
CityMelbourne
Period1/18/001/20/00

Fingerprint

Convolutional Codes
Block Ciphers
Hash functions
Convolutional codes
Block Codes
Error-correcting Codes
Hash Function
BCH Codes
Circuit Complexity
Binary codes
Block codes
Binary Code
Hardware Implementation
Hardware
Module
Networks (circuits)

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Inoue, T., & Sakurai, K. (2000). Making hash functions from block ciphers secure and efficient by using convolutional codes. In H. Imai, & Y. Zheng (Eds.), Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings (pp. 391-404). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1751). Springer Verlag.

Making hash functions from block ciphers secure and efficient by using convolutional codes. / Inoue, Toru; Sakurai, Kouichi.

Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. ed. / Hideki Imai; Yuliang Zheng. Springer Verlag, 2000. p. 391-404 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1751).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Inoue, T & Sakurai, K 2000, Making hash functions from block ciphers secure and efficient by using convolutional codes. in H Imai & Y Zheng (eds), Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1751, Springer Verlag, pp. 391-404, 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Australia, 1/18/00.
Inoue T, Sakurai K. Making hash functions from block ciphers secure and efficient by using convolutional codes. In Imai H, Zheng Y, editors, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Springer Verlag. 2000. p. 391-404. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Inoue, Toru ; Sakurai, Kouichi. / Making hash functions from block ciphers secure and efficient by using convolutional codes. Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. editor / Hideki Imai ; Yuliang Zheng. Springer Verlag, 2000. pp. 391-404 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{0b9b7be2b13a4d55ac1152a952bfe1ba,
title = "Making hash functions from block ciphers secure and efficient by using convolutional codes",
abstract = "We improve Knudsen-Preneel's constructions for cryptographic hash functions based on block ciphers with error correcting codes. We first modify to extend original constructions, which are effective only for non-binary codes, to the case with binary codes (e.g. BCH codes). We also revise the original method by introducing convolutional codes, whereas the previous adapts only block codes. This reduces the circuit complexity of the hardware-implementation 1/N times in terms of the number of (Davies-Meyer's) module functions than that based block error correcting codes.",
author = "Toru Inoue and Kouichi Sakurai",
year = "2000",
month = "1",
day = "1",
language = "English",
isbn = "3540669671",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "391--404",
editor = "Hideki Imai and Yuliang Zheng",
booktitle = "Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings",
address = "Germany",

}

TY - GEN

T1 - Making hash functions from block ciphers secure and efficient by using convolutional codes

AU - Inoue, Toru

AU - Sakurai, Kouichi

PY - 2000/1/1

Y1 - 2000/1/1

N2 - We improve Knudsen-Preneel's constructions for cryptographic hash functions based on block ciphers with error correcting codes. We first modify to extend original constructions, which are effective only for non-binary codes, to the case with binary codes (e.g. BCH codes). We also revise the original method by introducing convolutional codes, whereas the previous adapts only block codes. This reduces the circuit complexity of the hardware-implementation 1/N times in terms of the number of (Davies-Meyer's) module functions than that based block error correcting codes.

AB - We improve Knudsen-Preneel's constructions for cryptographic hash functions based on block ciphers with error correcting codes. We first modify to extend original constructions, which are effective only for non-binary codes, to the case with binary codes (e.g. BCH codes). We also revise the original method by introducing convolutional codes, whereas the previous adapts only block codes. This reduces the circuit complexity of the hardware-implementation 1/N times in terms of the number of (Davies-Meyer's) module functions than that based block error correcting codes.

UR - http://www.scopus.com/inward/record.url?scp=0013141788&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0013141788&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:0013141788

SN - 3540669671

SN - 9783540669678

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 391

EP - 404

BT - Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings

A2 - Imai, Hideki

A2 - Zheng, Yuliang

PB - Springer Verlag

ER -