Abstract
In this paper, we proposed a new (n, n) double block length hash function using Feistel network which is suitable for providing security to the WSN (wireless sensor network) device or RFID tags. We use three calls of AES-128 (E 1, E 2, E 3) in a single blockcipher E′ so that the efficiency rate is 0.33. Surprisingly we found that the security bound of this scheme is better than other famous (n, n) based blockcipher schemes such as MDC-2, MDC-4, MJH. The collision resistance (CR) and preimage resistance (PR) security bound are respectively by O(2n) and O(22n). We define our new scheme as JAIST according to our institute name.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Armknecht, F., Fleischmann, E., Krause, M., Lee, J., Stam, M., Steinberger, J.: The Preimage Security of Double-Block-Length Compression Functions. LNCS. ASIACRYPT, vol. 7073, pp. 233–251. Springer, Berlin (2011)
Black, J.A., Rogaway, P., Shrimpton, T.: Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. LNCS, CRYPTO, vol. 2442, pp. 320–335. Springer, Berlin (2002)
Black, J.A., Rogaway, P., Shrimpton, T., Stam, M.: An analysis of the blockcipher-based hash functions from PGV. J. Cryptol. 23, 519–545 (2010)
Bogdanov A., Leander G., Paar C., Poschmann A., Robshaw, M.J.B., Seurin, Y.: Hash Functions and RFID Tags: Mind the Gap. LNCS, CHES, vol. 5154, pp. 283–299. Springer, Berlin (2008)
Fleischmann, E., Forler, C., Gorski, M., Lucks, S.: Collision Resistant Double-Length Hashing. LNCS, PROVSEC, vol. 6402, pp. 102–118. Springer, Berlin (2010)
Fleischmann, E., Forler, C., Lucks, S., Wenzel, J.: Weimar-DM: A Highly Secure Double Length Compression Function. LNCS, ACISP, vol. 7372, pp. 152–165. Springer, Berlin (2012)
Hirose, S.: Some Plausible Constructions of Double-Block-Length Hash Functions. LNCS, FSE, vol. 4047, pp. 210–225. Springer, Berlin (2006)
Jesang, L., Seokhie, H., Jaechul, S., Haeryong, P.: A New Double-Block-Length Hash Function Using Feistel Structure. LNCS, ISA, vol. 5576, pp. 11–20. Springer, Berlin (2009)
Kaps, J.P., Sunar, B.: Energy Comparison of AES and SHA-1 for Ubiquitous Computing. LNCS, Emerging Directions in Embedded and Ubiquitous Computing, vol. 4097, pp. 372–381. Springer, Berlin (2006)
Knudsen, L., Preneel, B.: Fast and Secure Hashing Based on Codes. LNCS, CRYPTO, vol. 1294, pp. 485–498. Springer, Berlin (1997)
Lai, X., Massey, X.: Hash Function Based on Block Ciphers. LNCS, EUROCRYPT, vol. 658, pp. 55–70. Springer, Berlin (1993)
Lee, J., Kwon, D.: The security of abreast-DM in the ideal cipher model. IEICE Trans. 94-A(1), 104–109 (2011)
Lee, J., Stam, M.: MJH: A Faster Alternative to MDC-2. LNCS, CT-RSA, vol. 6558, pp. 213–236. Springer, Berlin (2011)
Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Comput. Netw. 54(17), 2967–2978 (2010)
Lee, J., Stam, M., Steinberger, J.: The Collision Security of Tandem-DM in the Ideal Cipher Model. LNCS, CRYPTO, vol. 6841, pp. 561–577. Springer, Berlin (2011)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, 5th edn. CRC Press, Boca Raton (2001)
Mennink, B.: Optimal Collision Security in Double Block Length Hashing with Single Length Key. LNCS, ASIACRYPT, vol. 7658, pp. 526–543. Springer, Berlin (2012)
Ozen, O., Stam, M.: Another Glance at Double-Length Hashing. LNCS. Cryptography and Coding, vol. 5291, pp. 176–201. Springer, Berlin (2009)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 128–134, 656–715 (1949)
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. LNCS, EUROCRYPT, vol. 3494, pp. 1–18. Springer, Berlin (2005)
Wang, X., Lai, X., Yu, X.: Finding Collisions in the Full SHA-1. LNCS, CRYPTO, vol. 3621, pp. 17–36. Springer, Berlin (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Miyaji, A., Rashed, M. (2015). A New (n, n) Blockcipher Hash Function Using Feistel Network: Apposite for RFID Security. In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds) Computational Intelligence in Data Mining - Volume 3. Smart Innovation, Systems and Technologies, vol 33. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2202-6_47
Download citation
DOI: https://doi.org/10.1007/978-81-322-2202-6_47
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2201-9
Online ISBN: 978-81-322-2202-6
eBook Packages: EngineeringEngineering (R0)