Abstract
Hash functions play an essential role in many areas of cryptographic applications such as digital signature, authentication, and key derivation. In this paper, we propose a new hash function with variable output length, namely HAS-V, to meet the needs of various security levels desired among different applications. A great deal of attention was paid to balance the characteristics of security and performance. The use of message expansion, 4-variable Boolean functions, variable and fixed amounts of shifts, and interrelated parallel lines provide a high level of security for HAS-V. Experiments show that HAS-V is about 19% faster than SHA-1, 31% faster than RIPEMD-160, and 26% faster than HAVAL on a Pentium PC.
Nan Kyoung Park is now with POSDATA, Pun-Dang Gu, Sung-Nam, 463-050, Korea
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
B. den Boer and A. Bosselaers, An attack on the last two rounds of MD4, Advances in Cryptology-Crypto’91, LNCS 576, Springer-Verlag, 1992, pp.194–203.
B. den Boer and A. Bosselaers, Collisions for the compression function of MD5, Advances in Cryptology-Eurocrypt’93, LNCS 773, Springer-Verlag, 1994, pp.293–304.
A. Bosselaers, R. Govaerts and J. Vandewalle, Fast hashing on the Pentium, Advances in Cryptology-Crypto’96, LNCS 1109, Springer-Verlag, 1996, pp.298–312.
A.Bosselares, R. Govarerts and J. Vandewalle, SHA: a design for parallel architecture, Advances in Cryptology-Eurocrypt’97, 1997, pp.348–362.
F. Chabaud and A. Joux, Differential collisions in SHA-0, Advances in Cryptology-Crypto’98, LNCS 1462, Springer-Verlag, 1998, pp.56–71.
I.B. Damgård, A design principle for hash functions, Proceedings of Crypto ’89, LNCS 435, Springer-Verlag, 1990, pp. 416–427.
H. Dobbertin, Cryptanalysis of MD4, Fast Software Encryption, LNCS 1039, Springer-Verlag, 1996, pp.53–69.
H. Dobbertin, The status of MD5 after a recent attack, CryptoBytes, 2(2), Sep. 1996, pp.1–6.
H. Dobbertin, A. Bosselaers and B. Preneel, RIPEMD160: A strengthened version of RIPEMD, Fast Software Encryption, LNCS1039, Springer-Verlag, 1996, pp.71–82. (An updated and corrected version is available at http://ftp.esat.kuleuven.ac.be,/pub/COSIC/bosselae/ripemd/ .)
C.H. Lim and P.J. Lee, A study on the proposed Korean digital signature algorithm, Advances in Cryptology-Asiacrypt’98, LNCS 1514, Springer-Verlag, 1998, pp. 175–186.
NIST, Secure hash standard, FIPS PUB 180-1, Department of Commerce, Washington D.C., Apr. 1995.
P.C. van Oorchot and M.J. Wiener, Parallel collision search with applications to hash functions and discrete logarithms. Proc. of 2nd ACM Conference on Computer and Communications Security, ACM Press, 1994, pp.210–218.
B. Preneel, Analysis and design of crytpographic hash functions, PHD thesis, Katholiceke University Leuven, 1993.
R. Rivest, The MD4 message digest algorithm, Advances in Cryptology-Crypto’90, LNCS 537, Springer-Verlag, 1991, pp.303–311.
R.Rivest, The MD5 message digest algorithm, RFC 1321, Internet Activities Board, Internet Privacy Task Force, Apr. 1992.
J. Seberry and X.M. Zhang, Highly nonlinear 0-1 balanced boolean functions satisfying strict avalanche criterion, Advances in Cryptology-Auscrypt’92, LNCS 718, Springer-Verlag, 1993, pp.145–154.
J. Seberry, X.M. Zhang and Y. Zheng, Nonlinearity and propagation characteristics of balanced boolean functions, Information and Computation, 119, 1995, pp.1–13.
G. Yuval, How to swindle Rabin, Cryptologia, Vol. 3, No. 3, 1979, pp.187–189.
Y. Zheng, J. Pieprzyk and J. Sebberry, HAVAL-A one-way hashing algorithm with variable length of output, Advances in Cryptology-Auscrypt’92, LNCS 718, Springer-Verlag, 1993, pp.83–104.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-VerlagBerlin Heidelberg
About this paper
Cite this paper
Kyoung Park, N., Ho Hwang, J., Joong Lee, P. (2001). HAS-V: A New Hash Function with Variable Output Length. In: Stinson, D.R., Tavares, S. (eds) Selected Areas in Cryptography. SAC 2000. Lecture Notes in Computer Science, vol 2012. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44983-3_15
Download citation
DOI: https://doi.org/10.1007/3-540-44983-3_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42069-9
Online ISBN: 978-3-540-44983-6
eBook Packages: Springer Book Archive