A NEW HASH FUNCTION-SMD(STRENCGTHEND MESSAGE DIGEST) AND ITS APPLICATION TO MAC

  • Published : 1999.09.01

Abstract

We propose a new hash function-SMD(Strengthened Mes-sage Digest) based on the design principle of dedicated hash functions. It processes an arbitrary finite message by 512-bit block and outputs 160 bits digest and has data-dependent rotation characteristic which guar-anteens the strength against existing known attacks. Moreover we also propose a new keyed MAC(Message Authentication Code) constructed by using the proposed hash function. The proposed MAC uses a max-imum keys of 160 bits and hs an output-length less than equal to the hash result. From the viewpoint of performance the proposed MAC is only reduced about 10% comparing to the underlying hash function.

Keywords

References

  1. Advances in Cryptology-Crypto'96, Lecture Notes in Computer Science v.1109 Keying Hash Functions for Message Authentication M.Bellare;R.Canetti;H.Krawczyk
  2. Advances in Cryptology-Crypto'94, Lecture Notes in Computer Science v.839 The security of cipher block chaining M.Bellare;J.Kilian;P.Rogaway
  3. Advances in Cryptology-Crypto'90, Lecture Notes in Computer Science v.537 Differential cryptanalysis of DES-like crytoysystems E.Biham;A.Shamir
  4. Advances in Cryptology-Crypto'91, Lecture Notes in Computer Science v.576 An attack on the last two rounds of MD4 B.den Boer;A.Bosselaers
  5. ETRI J. v.19 no.4 Corrlation Immune Functions with Controllable Nonlinearity Chee,S.Lee;K.Kim;D.Kim
  6. Advances in Cryptology-Crypto'89, Lecture Notes in Computer Science v.435 A design principle for hash functions I.B.Damgard
  7. Journal of Cryptology v.10 no.1 RIPEMD with two-round compress function is not collision-free H.Dobbertin
  8. Fast Software Encryption-Cambridge Workshop, Lecture Notes in Computer Science v.1039 Crytanalysis of MD4 H.Dobbertin
  9. Fast Software Encryption-Cambridge Workshop, Lecture Notes in Computer Science v.1039 A strengthened version of RIPEMD H.Dobbertin;A.Bosselaers;B.Preneel
  10. RSA LAB's CryptoBytes v.2 no.2 The status of MD5 after recent attack H.Dobbertin
  11. RSA LAB's CryptoBytes v.1 no.1 Message Authentication with MD5 B.Kaliski;M.Robshaw
  12. Advances in Cryptology Crypto'94, Lecture Notes in Computer Science v.839 The first experimental cryptanalysis of the Data Encryption Standard M.Matsui
  13. Advances in Cryptology Crypto'89, Lecture Notes in Computer Science v.435 One way hash functions and DES R.Merkle
  14. FIPS 180, US Department of Commerce Secure hash standard NIST
  15. FIPS 180-1, US Department of Commerce Secure hash standard NIST
  16. Proc. of the 2nd ACM Conference on Computer and Communications Security Parallel collision search with applications to hash functions and discrete logarithms P.C.van Oorshot;M.J.Wiener
  17. Analysis and design of crytographic hash functions B.Prenceel
  18. Advances in Cryptology-Crypto'95, Lecture Notes in Computer Science v.963 MDx-Mac and Building Fast MACs from Hash Functions B.Preneel,P.van Oorschot
  19. Advances in Cryptology-Crypto'96, Lecture Notes in Computer Science v.963 On the security of two MAC algorithms PO2B.Preneel;P.van Oorschot
  20. Lecture Notes in Computer Science v.1007 RIPE Consortium : RIPE Integrity Primitives-Final report of Race Integrity Primitives Evaluation (R1040)
  21. Request For Comments(RFC) 1320 The MD4 message-digest algorithm R.Rivest
  22. Request For Comments(RFC) 1320 The MD5 message-digest algorithm R.Rivest
  23. RSA LAB's CryBytes v.1 no.1 The RC5 Encryption Algorithm R.Rivest
  24. Advances in Cryptology-Auscrypt'92, Lecture Notes in Computer Science v.718 Highly nonlinear 0-1 balanced functions satisfying strict avalanche criterion J.Seberry;X.M.Zhang
  25. Proceedings of Infocom'92 Message authentication with one-way hash functions G.Tsudik
  26. Advances in Cryptology-Auscrypt'92, Lecture Notes in Computer Science v.718 HAVAL- a one-way hashing algorithm with variable length and output Y.Zheng;J.Pieprzyk;J.Seberry
  27. Proceedings of the 1-st workshop in Applied Mathematics Fast generator of random permutation Seung Chul Ko;Kyung Hyune Rhee
  28. PKD'98(International Workshop on Practice and Theory in Public Key Cryptograpy), Lecture Notes on Computer Science v.1431 A new hash function based on MDx-family and its application to MAC Sang Uk Shin;Kyung Hyune Rhee;Dae Hyun Ryu;Sang Jin Lee
  29. The proposal of the new hash function possible to select the output length Chae Hoon Lim;Nan Kyung Park;Eun Jeong Lee;Pil Joong Lee