Design of Lightweight Hash Function Based on Iterate

Article Preview

Abstract:

A hash function hMISR that suitable for passive devices is proposed. Taking parallel LFSR as the basic component hMISR provides the security through one-wayness brought by the information loss in the process of compression. When implemented, the hardware complexity of hMISR is much lower than Toeplitz hash.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

786-789

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. Ranasinghe, D. Engels, P. Cole, Low-cost RFID systems: Confronting security and privacy, Auto-ID Labs Research Workshop, (2004).

Google Scholar

[2] Feldhofer, M. and Rechberger, C. (2006). A Case Against Currently Used Hash Functions in RFID Protocols. [C] In Meersman, R. et al. (Eds. ), On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (p.372: 381). Berlin: Springer-Verlag.

DOI: 10.1007/11915034_61

Google Scholar

[3] Aumasson J P, Henzen L, Meier W, et al. Quark: A lightweight hash [J]. Journal of cryptology, 2013, 26(2): 313-339.

DOI: 10.1007/s00145-012-9125-6

Google Scholar

[4] A. Bogdanov, M. Knezevic, G. Leander, D. Toz, K. Varici, and I. Verbauwhede. SPONGENT: A lightweight hash function. In B. Preneel and T. Takagi, editors, CHES, volume 6917 of Lecture Notes in Computer Science, pages 312-325. Springer, (2011).

DOI: 10.1007/978-3-642-23951-9_21

Google Scholar

[5] Huang, A.L.; Penzhorn, W.T.; cryptographic hash functions and low power techniques for embedded hardware[C]. Industrial Electronics, 2005. ISIE 2005. Proceedings of the IEEE International Symposium on. Vol. 4: 1789-1794.

DOI: 10.1109/isie.2005.1529204

Google Scholar

[6] P.P. Deepthi, P.S. Sathidevi. Design implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions [J]. Computers & Security, 2009, 28(3-4): pp.229-241.

DOI: 10.1016/j.cose.2008.11.006

Google Scholar

[7] Yeh TC, Wang YJ, Kuo TC, Securing RFID systems conforming to EPC Class 1 Generation 2 standard[J], expert system with application, 2010, 37(12): 7678-7683.

DOI: 10.1016/j.eswa.2010.04.074

Google Scholar

[8] Mihir Bellare and Tadayoshi Kohno. Hash function balance and its impact on birthday attacks[C]. In Proceedings of EUROCRYP'04, volume 3027 of Lecture Notes in Computer Science. Springer-Verlag, (2004).

DOI: 10.1007/978-3-540-24676-3_24

Google Scholar

[9] I. Damgärd: A design principle for hash functions[C]. In: Advances in Cryptology – CRYPTO 1989, Lecture Notes in Computer Science, Vol. 435, ed. by G. Brassard (Springer, Berlin Heidelberg 1989) p.416: 427.

DOI: 10.1007/0-387-34805-0_39

Google Scholar

[10] R. Merkle: One way Hash Functions and DES[C]. In: Advances in Cryptology CRYPTO 1989, Lecture Notes in Computer Science, Vol. 435, ed. By G.

DOI: 10.1007/0-387-34805-0_40

Google Scholar

[11] Min, Y.; Malaiya, Y.K.; Jin, B.; analysis of detection capability of parallel signature analyzers[J], IEEE Transactions on Computers, 1991, 40(9): p.1075: 1081.

DOI: 10.1109/12.83655

Google Scholar

[12] Gao S J, Wang H J, Li H. Hash function based on multiple input signature analysis registers and the application in EPC C1G2 tag[C]/Communication Technology (ICCT), 2012 IEEE 14th International Conference on. IEEE, 2012: 841-844.

DOI: 10.1109/icct.2012.6511411

Google Scholar