联合使用哈希函数位和纠错编码提高系统可靠性

M. Basil, W. Adi
{"title":"联合使用哈希函数位和纠错编码提高系统可靠性","authors":"M. Basil, W. Adi","doi":"10.1109/EST.2015.15","DOIUrl":null,"url":null,"abstract":"Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash digest itself. This may be a result of transmission error or a possible abusing attack on the system. It is observed that most practical systems deploy a bit-size for the hash mappings which ranges from 160 bits to 512 bits or more. This is often over dimensioned to comply with standardized hash functions. Therefore, the hash function bits as output of pseudorandom mapping can be replaced partially and temporarily by some forward error correcting code ECC leaving the remaining bits for authentication without significant loss of authentication security. This work evaluates a practical example combining a simple interleaved Reed-Solomon single-byte error correcting code to replace a small part of the hash bits in the sent message. On the receiving side, the ECC bytes are used to correct errors and then removed and replaced by the remainder of the original hash value. The non-replaced large hash bits would contribute to let the miss-correction performance of the code approaches zero. This technique would reduce non-significantly or even negligibly the authentication level of the system, however would improve the overall system reliability in a great deal. No changes in the size and format of the existing authenticated message are necessary. The reliability improvement and security degradation in our proposed technique are evaluated and compared with the original designed values. Experimental simulations are also compared with those statistically computed under idealized randomizing assumptions for the hash function.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding\",\"authors\":\"M. Basil, W. Adi\",\"doi\":\"10.1109/EST.2015.15\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash digest itself. This may be a result of transmission error or a possible abusing attack on the system. It is observed that most practical systems deploy a bit-size for the hash mappings which ranges from 160 bits to 512 bits or more. This is often over dimensioned to comply with standardized hash functions. Therefore, the hash function bits as output of pseudorandom mapping can be replaced partially and temporarily by some forward error correcting code ECC leaving the remaining bits for authentication without significant loss of authentication security. This work evaluates a practical example combining a simple interleaved Reed-Solomon single-byte error correcting code to replace a small part of the hash bits in the sent message. On the receiving side, the ECC bytes are used to correct errors and then removed and replaced by the remainder of the original hash value. The non-replaced large hash bits would contribute to let the miss-correction performance of the code approaches zero. This technique would reduce non-significantly or even negligibly the authentication level of the system, however would improve the overall system reliability in a great deal. No changes in the size and format of the existing authenticated message are necessary. The reliability improvement and security degradation in our proposed technique are evaluated and compared with the original designed values. Experimental simulations are also compared with those statistically computed under idealized randomizing assumptions for the hash function.\",\"PeriodicalId\":402244,\"journal\":{\"name\":\"2015 Sixth International Conference on Emerging Security Technologies (EST)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Sixth International Conference on Emerging Security Technologies (EST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EST.2015.15\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Sixth International Conference on Emerging Security Technologies (EST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2015.15","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

散列函数广泛部署在许多加密应用程序中,例如消息完整性检查、数字签名、消息认证码(mac)和许多其他应用程序。实际上,哈希函数主要用于检测篡改和证明消息的真实性。因此,如果哈希摘要与发送的摘要不匹配,这表明数据或哈希摘要本身被修改了。这可能是传输错误的结果,也可能是对系统的滥用攻击。据观察,大多数实际系统为哈希映射部署一个位大小,范围从160位到512位或更多。这通常是过维的,以符合标准化的散列函数。因此,作为伪随机映射输出的哈希函数比特可以被一些前向纠错码ECC部分地和暂时地替换,留下剩余的比特用于身份验证,而不会严重损失身份验证安全性。这项工作评估了一个实际的例子,结合一个简单的交错Reed-Solomon单字节纠错码来替换发送消息中的一小部分哈希位。在接收端,ECC字节用于纠正错误,然后删除并替换为原始哈希值的剩余部分。未替换的大哈希位将有助于使代码的纠错性能接近零。这种技术将不显著地或甚至可以忽略系统的身份验证级别,但是将大大提高整个系统的可靠性。不需要更改现有经过身份验证的消息的大小和格式。并与原设计值进行了可靠性改进和安全性降低的比较。实验模拟也与哈希函数在理想随机化假设下的统计计算结果进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding
Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash digest itself. This may be a result of transmission error or a possible abusing attack on the system. It is observed that most practical systems deploy a bit-size for the hash mappings which ranges from 160 bits to 512 bits or more. This is often over dimensioned to comply with standardized hash functions. Therefore, the hash function bits as output of pseudorandom mapping can be replaced partially and temporarily by some forward error correcting code ECC leaving the remaining bits for authentication without significant loss of authentication security. This work evaluates a practical example combining a simple interleaved Reed-Solomon single-byte error correcting code to replace a small part of the hash bits in the sent message. On the receiving side, the ECC bytes are used to correct errors and then removed and replaced by the remainder of the original hash value. The non-replaced large hash bits would contribute to let the miss-correction performance of the code approaches zero. This technique would reduce non-significantly or even negligibly the authentication level of the system, however would improve the overall system reliability in a great deal. No changes in the size and format of the existing authenticated message are necessary. The reliability improvement and security degradation in our proposed technique are evaluated and compared with the original designed values. Experimental simulations are also compared with those statistically computed under idealized randomizing assumptions for the hash function.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信