Abstract
We describe a parallel algorithm for extending a small domain hash function to a very large domain hash function. Our construction can handle messages of any practical length and preserves the security properties of the basic hash function. The construction can be viewed as a parallel version of the well known Merkle-DamIEqgard construction, which is a sequential construction. Our parallel algorithm provides a significant reduction in the computation time of the message digest, which is a basic operation in digital signatures.
This research supported by a grant from the Mathematics of Information Technology and Complex Systems (MITACS) project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Bellare and P. Rogaway. Collision-resistant hashing: towards making UOWHFs practical. Proceedings of CRYPTO 1997, pp 470–484.
I. B. Damgard. A design principle for hash functions. Lecture Notes in Computer Science, 435 (1990), 416–427 (Advances in Cryptology-CRYPTO’89).
R. C. Merkle. One way hash functions and DES. Lecture Notes in Computer Science, 435 (1990), 428–226 (Advances in Cryptology-CRYPTO’89).
I. Mironov. Hash functions: from Merkle-Damgard to Shoup. Lecture Notes in Computer Science, 2045 (2001), 166–181 (Advances in Cryptology-EUROCRYPT’01).
M. Naor and M. Yung. Universal one-way hash functions and their cryptographic aplications. Proceedings of the 21st Annual Symposium on Theory of Computing, ACM, 1989, pp. 33–43.
B. Preneel. The state of cryptographic hash functions. Lecture Notes in Computer Science, 1561 (1999), 158–182 (Lectures on Data Security: Modern Cryptology in Theory and Practice).
P. Sarkar and P. J. Schellenberg. A parallel algorithm for extending cryptographic hash functions. CACR Technical Report, University of Waterloo, http://www.cacr.math.uwaterloo.ca
D. R. Stinson. Some observations on the theory of cryptographic hash functions. IACR preprint server, http://eprint.iacr.org/2001/020/.
D. R. Stinson. Cryptography: Theory and Practice, CRC Press, 1995.
M. N. Wegman and J. L. Carter. New Hash Functions and Their Use in Authentication and Set Equality. Journal of Computer and System Sciences, 22(3): 265–279 (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sarkar, P., Schellenberg, P.J. (2001). A Parallel Algorithm for Extending Cryptographic Hash Functions. In: Rangan, C.P., Ding, C. (eds) Progress in Cryptology — INDOCRYPT 2001. INDOCRYPT 2001. Lecture Notes in Computer Science, vol 2247. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45311-3_4
Download citation
DOI: https://doi.org/10.1007/3-540-45311-3_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43010-0
Online ISBN: 978-3-540-45311-6
eBook Packages: Springer Book Archive