Probability Distributions for Elliptic Curves in the CGL Hash Function

08/14/2021
by   Dhruv Bhatia, et al.
0

Hash functions map data of arbitrary length to data of predetermined length. Good hash functions are hard to predict, making them useful in cryptography. We are interested in the elliptic curve CGL hash function, which maps a bitstring to an elliptic curve by traversing an input-determined path through an isogeny graph. The nodes of an isogeny graph are elliptic curves, and the edges are special maps betwixt elliptic curves called isogenies. Knowing which hash values are most likely informs us of potential security weaknesses in the hash function. We use stochastic matrices to compute the expected probability distributions of the hash values. We generalize our experimental data into a theorem that completely describes all possible probability distributions of the CGL hash function. We use this theorem to evaluate the collision resistance of the CGL hash function and compare this to the collision resistance of an "ideal" hash function.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/29/2018

SHAH: Hash Function based on Irregularly Decimated Chaotic Map

In this paper, we propose a novel hash function based on irregularly dec...
research
02/07/2023

Homomorphic Hashing Based on Elliptic Curve Cryptography

For avoiding the exposure of plaintexts in cloud environments, some homo...
research
02/21/2020

Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function

Pseudorandom bit generators (PRBG) can be designed to take the advantage...
research
03/15/2019

Hash functions from superspecial genus-2 curves using Richelot isogenies

Last year Takashima proposed a version of Charles, Goren and Lauter's ha...
research
09/11/2018

Maximally Consistent Sampling and the Jaccard Index of Probability Distributions

We introduce simple, efficient algorithms for computing a MinHash of a p...
research
04/30/2022

Failing to hash into supersingular isogeny graphs

An important open problem in supersingular isogeny-based cryptography is...
research
06/14/2018

Ramanujan graphs in cryptography

In this paper we study the security of a proposal for Post-Quantum Crypt...

Please sign up or login with your details

Forgot password? Click here to reset