{"title":"移动网络中基于元胞自动机的轻量级哈希函数","authors":"Xing Zhang, Qinbao Xu, Xiao Wei Li, Changda Wang","doi":"10.1109/MSN48538.2019.00055","DOIUrl":null,"url":null,"abstract":"Since the classical hash function widely used are costly for resource constrained devices, in this paper we propose a new lightweight hash function LNHASH through Cellular Automata(CA), in which sponge construction is applied as the mode of operation. Both linear and non-linear CA rules are employed to construct the internal permutation to achieve high diffusion and confusion. LNHASH allows making trade-offs among security, speed, energy consumption and implementation costs by adjusting the corresponding parameters. The hardware-friendly Sbox and linear layer bring low area implementation. Security analysis results show the resistance of the LNHASH scheme against the known attacks.","PeriodicalId":368318,"journal":{"name":"2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Lightweight Hash Function Based on Cellular Automata for Mobile Network\",\"authors\":\"Xing Zhang, Qinbao Xu, Xiao Wei Li, Changda Wang\",\"doi\":\"10.1109/MSN48538.2019.00055\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since the classical hash function widely used are costly for resource constrained devices, in this paper we propose a new lightweight hash function LNHASH through Cellular Automata(CA), in which sponge construction is applied as the mode of operation. Both linear and non-linear CA rules are employed to construct the internal permutation to achieve high diffusion and confusion. LNHASH allows making trade-offs among security, speed, energy consumption and implementation costs by adjusting the corresponding parameters. The hardware-friendly Sbox and linear layer bring low area implementation. Security analysis results show the resistance of the LNHASH scheme against the known attacks.\",\"PeriodicalId\":368318,\"journal\":{\"name\":\"2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MSN48538.2019.00055\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSN48538.2019.00055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Lightweight Hash Function Based on Cellular Automata for Mobile Network
Since the classical hash function widely used are costly for resource constrained devices, in this paper we propose a new lightweight hash function LNHASH through Cellular Automata(CA), in which sponge construction is applied as the mode of operation. Both linear and non-linear CA rules are employed to construct the internal permutation to achieve high diffusion and confusion. LNHASH allows making trade-offs among security, speed, energy consumption and implementation costs by adjusting the corresponding parameters. The hardware-friendly Sbox and linear layer bring low area implementation. Security analysis results show the resistance of the LNHASH scheme against the known attacks.