Abstract
All-or-nothing property is a new encryption mode proposed by Rivest and has the property that one must decrypt the entire ciphertext to determine any plaintext block. In this paper, we propose a hash function with all-or-nothing property. The proposed scheme can use the existing hash functions without changing their structures, and it is secure against all of known attacks. Moreover, the proposed method can be easily extended to the MAC(Message Authentication Code) and provide message confidentiality as well as authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Bellare, R. Canetti, H. Krawczyk,: Keying Hash Functions for Message Authentication, Advances in Cryptology-Crypto’96, LNCS, vol. 1109. Springer-Verlag (1996) 1–15
I.B. Damgård,: A design principle for hash functions, Advances in Cryptology-CRYPTO 89, LNCS, vol. 435. Springer-Verlag (1990) 416–427
H. Dobbertin, A. Bosselaers, B. Preneel,: RIPEMD-160: A strengthened version of RIPEMD, Fast Software Encryption-Cambridge Workshop, LNCS, vol. 1039. Springer-Verlag (1996) 71–82
FIPS 180-1,: Secure hash standard, Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce / Nist (1995)
L. Knudsen, B. Preneel,: Fast and secure hashing based on codes, Advances in Cryptology-CRYPTO 97, LNCS, vol. 1294. (1997) 485–498
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone,: Handbook of Applied Cryptography, CRC Press (1997)
R. Merkle,: One way hash functions and DES, Advances in Cryptology-CRYPTO 89, LNCS, vol. 435. (1990) 428–446
B. Preneel, P. van Oorschot,: MDx-MAC and Building Fast MACs from Hash Functions, Advances in Cryptology-Crypto’95, LNCS, vol. 963. Springer-Verlag (1995) 1–14
R.L. Rivest,: The MD4 message-digest algorithm, Advances in Cryptology-CRYPTO 90, LNCS, vol. 37. Springer-Verlag (1991) 303–311
RFC 1321,:The MD5 message-digest algorithm, Internet request for comments 321, R.L Rivest, (1992)
R. L. Rivest,: All-Or-Nothing Encryption and The Package Transform, The Proceedings of the 1997 Fast Software Encryption Conference, LNCS, vol. 1267. Springer-Verlag (1997) 210–218
Ronald L. Rivest, M.J.B. Robshaw, R. Sidney, and Y.L. Yin,: The RC6 Block Cipher, a block cipher submitted for consideration as the new AES
Sang Uk. Shin, Kyung Hyune Rhee, Dae Hyun Ryu, Sang Jin Lee,: A new hash function based on MDx-family and its application to MAC, PKC’98(International Workshop on Practice and Theory in Public Key Cryptography), LNCS, vol. 1431. Springer-Verlag (1998) 234–246
Y. Zheng, J. Pieprzyk, J. Sebery,: HAVAL-a one-way hashing algorithm with variable length of output, Advances in Cryptology-AUSCRYPT 92, LNCS, vol. 718. Springer-Verlag (1993) 83–104
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shin, S.U., Rhee, K.H., Yoon, J.W. (1999). Hash Functions and the MAC Using All-or-Nothing Property. In: Public Key Cryptography. PKC 1999. Lecture Notes in Computer Science, vol 1560. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49162-7_21
Download citation
DOI: https://doi.org/10.1007/3-540-49162-7_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65644-9
Online ISBN: 978-3-540-49162-0
eBook Packages: Springer Book Archive