Skip to main content

Hash Functions and the MAC Using All-or-Nothing Property

  • Conference paper
  • First Online:
Public Key Cryptography (PKC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1560))

Included in the following conference series:

Abstract

All-or-nothing property is a new encryption mode proposed by Rivest and has the property that one must decrypt the entire ciphertext to determine any plaintext block. In this paper, we propose a hash function with all-or-nothing property. The proposed scheme can use the existing hash functions without changing their structures, and it is secure against all of known attacks. Moreover, the proposed method can be easily extended to the MAC(Message Authentication Code) and provide message confidentiality as well as authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bellare, R. Canetti, H. Krawczyk,: Keying Hash Functions for Message Authentication, Advances in Cryptology-Crypto’96, LNCS, vol. 1109. Springer-Verlag (1996) 1–15

    Google Scholar 

  2. I.B. Damgård,: A design principle for hash functions, Advances in Cryptology-CRYPTO 89, LNCS, vol. 435. Springer-Verlag (1990) 416–427

    Chapter  Google Scholar 

  3. H. Dobbertin, A. Bosselaers, B. Preneel,: RIPEMD-160: A strengthened version of RIPEMD, Fast Software Encryption-Cambridge Workshop, LNCS, vol. 1039. Springer-Verlag (1996) 71–82

    Google Scholar 

  4. FIPS 180-1,: Secure hash standard, Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce / Nist (1995)

    Google Scholar 

  5. L. Knudsen, B. Preneel,: Fast and secure hashing based on codes, Advances in Cryptology-CRYPTO 97, LNCS, vol. 1294. (1997) 485–498

    Chapter  Google Scholar 

  6. A.J. Menezes, P.C. van Oorschot, S.A. Vanstone,: Handbook of Applied Cryptography, CRC Press (1997)

    Google Scholar 

  7. R. Merkle,: One way hash functions and DES, Advances in Cryptology-CRYPTO 89, LNCS, vol. 435. (1990) 428–446

    Chapter  Google Scholar 

  8. B. Preneel, P. van Oorschot,: MDx-MAC and Building Fast MACs from Hash Functions, Advances in Cryptology-Crypto’95, LNCS, vol. 963. Springer-Verlag (1995) 1–14

    Google Scholar 

  9. R.L. Rivest,: The MD4 message-digest algorithm, Advances in Cryptology-CRYPTO 90, LNCS, vol. 37. Springer-Verlag (1991) 303–311

    Chapter  Google Scholar 

  10. RFC 1321,:The MD5 message-digest algorithm, Internet request for comments 321, R.L Rivest, (1992)

    Google Scholar 

  11. R. L. Rivest,: All-Or-Nothing Encryption and The Package Transform, The Proceedings of the 1997 Fast Software Encryption Conference, LNCS, vol. 1267. Springer-Verlag (1997) 210–218

    Chapter  Google Scholar 

  12. Ronald L. Rivest, M.J.B. Robshaw, R. Sidney, and Y.L. Yin,: The RC6 Block Cipher, a block cipher submitted for consideration as the new AES

    Google Scholar 

  13. Sang Uk. Shin, Kyung Hyune Rhee, Dae Hyun Ryu, Sang Jin Lee,: A new hash function based on MDx-family and its application to MAC, PKC’98(International Workshop on Practice and Theory in Public Key Cryptography), LNCS, vol. 1431. Springer-Verlag (1998) 234–246

    Google Scholar 

  14. Y. Zheng, J. Pieprzyk, J. Sebery,: HAVAL-a one-way hashing algorithm with variable length of output, Advances in Cryptology-AUSCRYPT 92, LNCS, vol. 718. Springer-Verlag (1993) 83–104

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shin, S.U., Rhee, K.H., Yoon, J.W. (1999). Hash Functions and the MAC Using All-or-Nothing Property. In: Public Key Cryptography. PKC 1999. Lecture Notes in Computer Science, vol 1560. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49162-7_21

Download citation

  • DOI: https://doi.org/10.1007/3-540-49162-7_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65644-9

  • Online ISBN: 978-3-540-49162-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics