Keyed hash function from large girth expander graphs

03/14/2019
by   Eustrat Zhupa, et al.
0

In this paper we present an algorithm to compute keyed hash function (message authentication code MAC). Our approach uses a family of expander graphs of large girth denoted D(n,q), where n is a natural number bigger than one and q is a prime power. Expander graphs are known to have excellent expansion properties and thus they also have very good mixing properties. All requirements for a good MAC are satisfied in our method and a discussion about collisions and preimage resistance is also part of this work. The outputs closely approximate the uniform distribution and the results we get are indistinguishable from random sequences of bits. Exact formulas for timing are given in term of number of operations per bit of input. Based on the tests, our method for implementing DMAC shows good efficiency in comparison to other techniques. 4 operations per bit of input can be achieved. The algorithm is very flexible and it works with messages of any length. Many existing algorithms output a fixed length tag, while our constructions allow generation of an arbitrary length output, which is a big advantage.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/08/2019

Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions

We consider fuzzy, or continuous, bits, which take values in [0;1] and (...
research
06/11/2021

Property-Preserving Hash Functions from Standard Assumptions

Property-preserving hash functions allow for compressing long inputs x_0...
research
02/21/2020

Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function

Pseudorandom bit generators (PRBG) can be designed to take the advantage...
research
08/19/2020

The Power of Hashing with Mersenne Primes

The classic way of computing a k-universal hash function is to use a ran...
research
08/02/2022

Couboundary Expansion of Sheaves on Graphs and Weighted Mixing Lemmas

We study the coboundary expansion of graphs, but instead of using 𝔽_2 as...
research
04/19/2023

Uniform Generation of Temporal Graphs with Given Degrees

Uniform sampling from the set 𝒢(𝐝) of graphs with a given degree-sequenc...
research
08/23/2019

Bi-Homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption

We define a pseudorandom function (PRF) F: K×X→Y to be bi-homomorphic wh...

Please sign up or login with your details

Forgot password? Click here to reset