{"title":"基于Lesamnta-LW压缩函数模式和MDP域扩展的轻量级哈希","authors":"Asraf Akhimullah, Shoichi Hirose","doi":"10.1109/CANDAR.2016.0107","DOIUrl":null,"url":null,"abstract":"This paper presents a block-cipher-based hashing scheme suitable for resource constrained devices. It uses the Lesamnta-LW compression function mode and the MDP domain extension. Then, this paper provides provable security analyses of the proposed scheme. It is shown that the proposed scheme is both collision-resistant and preimage-resistant up to the birthday bound in the ideal cipher model. It is also shown that the proposed scheme in the keyed-via-IV mode is a pseudorandom function if the underlying block cipher is a pseudorandom permutation. These results imply that the proposed scheme has the same level of security as the original Lesamnta-LW hashing scheme. Unlike the original Lesamnta-LW hashing scheme, the keyed-via-IV mode of the proposed scheme does not require output truncation. This property is useful when the proposed scheme is used for pseudorandom sequence generation.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Lightweight Hashing Using Lesamnta-LW Compression Function Mode and MDP Domain Extension\",\"authors\":\"Asraf Akhimullah, Shoichi Hirose\",\"doi\":\"10.1109/CANDAR.2016.0107\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a block-cipher-based hashing scheme suitable for resource constrained devices. It uses the Lesamnta-LW compression function mode and the MDP domain extension. Then, this paper provides provable security analyses of the proposed scheme. It is shown that the proposed scheme is both collision-resistant and preimage-resistant up to the birthday bound in the ideal cipher model. It is also shown that the proposed scheme in the keyed-via-IV mode is a pseudorandom function if the underlying block cipher is a pseudorandom permutation. These results imply that the proposed scheme has the same level of security as the original Lesamnta-LW hashing scheme. Unlike the original Lesamnta-LW hashing scheme, the keyed-via-IV mode of the proposed scheme does not require output truncation. This property is useful when the proposed scheme is used for pseudorandom sequence generation.\",\"PeriodicalId\":322499,\"journal\":{\"name\":\"2016 Fourth International Symposium on Computing and Networking (CANDAR)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Fourth International Symposium on Computing and Networking (CANDAR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CANDAR.2016.0107\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CANDAR.2016.0107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Lightweight Hashing Using Lesamnta-LW Compression Function Mode and MDP Domain Extension
This paper presents a block-cipher-based hashing scheme suitable for resource constrained devices. It uses the Lesamnta-LW compression function mode and the MDP domain extension. Then, this paper provides provable security analyses of the proposed scheme. It is shown that the proposed scheme is both collision-resistant and preimage-resistant up to the birthday bound in the ideal cipher model. It is also shown that the proposed scheme in the keyed-via-IV mode is a pseudorandom function if the underlying block cipher is a pseudorandom permutation. These results imply that the proposed scheme has the same level of security as the original Lesamnta-LW hashing scheme. Unlike the original Lesamnta-LW hashing scheme, the keyed-via-IV mode of the proposed scheme does not require output truncation. This property is useful when the proposed scheme is used for pseudorandom sequence generation.