{"title":"动态哈希安全系统中基于消息的选择矩阵","authors":"M. Inayatullah, M. Ahmad, Q. Khan","doi":"10.1109/ICET.2007.4516313","DOIUrl":null,"url":null,"abstract":"Hash based security systems using a one way hash function are widely used in the network security. Design of such system revolves around the selection of proper function. An ideal hash function is the one that will never cause a collision. Although separate chaining and other techniques can be successfully applied for collision resolution, it is still a challenging job to find a suitable hash function. In this paper, we propose a simple technique that is based on a matrix of hash functions. A hash function is selected from the matrix based on message contents. With different hash functions used in single communication scenario, it is possible to strengthen the overall security of the system. Even if one of the hash functions is compromised, it is not possible to predict the next hash function associated with the message to calculate the message hash.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Message based Selection Matrix for Dynamic Hash based Security Systems\",\"authors\":\"M. Inayatullah, M. Ahmad, Q. Khan\",\"doi\":\"10.1109/ICET.2007.4516313\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hash based security systems using a one way hash function are widely used in the network security. Design of such system revolves around the selection of proper function. An ideal hash function is the one that will never cause a collision. Although separate chaining and other techniques can be successfully applied for collision resolution, it is still a challenging job to find a suitable hash function. In this paper, we propose a simple technique that is based on a matrix of hash functions. A hash function is selected from the matrix based on message contents. With different hash functions used in single communication scenario, it is possible to strengthen the overall security of the system. Even if one of the hash functions is compromised, it is not possible to predict the next hash function associated with the message to calculate the message hash.\",\"PeriodicalId\":346773,\"journal\":{\"name\":\"2007 International Conference on Emerging Technologies\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Emerging Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICET.2007.4516313\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2007.4516313","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Message based Selection Matrix for Dynamic Hash based Security Systems
Hash based security systems using a one way hash function are widely used in the network security. Design of such system revolves around the selection of proper function. An ideal hash function is the one that will never cause a collision. Although separate chaining and other techniques can be successfully applied for collision resolution, it is still a challenging job to find a suitable hash function. In this paper, we propose a simple technique that is based on a matrix of hash functions. A hash function is selected from the matrix based on message contents. With different hash functions used in single communication scenario, it is possible to strengthen the overall security of the system. Even if one of the hash functions is compromised, it is not possible to predict the next hash function associated with the message to calculate the message hash.