Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3
نویسندگان
چکیده
Discussions about the choice of a tree hash mode of operation for a standardization have recently been undertaken. It appears that a single tree mode cannot address adequately all possible uses and specifications of a system. In this paper, we review the tree modes which have been proposed, we discuss their problems and propose solutions. We make the reasonable assumption that communicating systems have different specifications and that software applications are of different types (securing stored content or live-streamed content). Finally, we propose new modes of operation that address the resource usage problem for three representative categories of devices and we analyse their asymptotic behavior.
منابع مشابه
S : a flexible coding for tree hashing
We propose a flexible, fairly general, coding for tree hash modes. The coding does not define a tree hash mode, but instead specifies a way to format the message blocks and chaining values into inputs to the underlying function for any topology, including sequential hashing. The main benefit is to avoid input clashes between different tree growing strategies, even before the hashing modes are d...
متن کاملOn Plausible Tree Hash Modes for SHA-3
Discussions are currently underway about the choice of a tree hash mode of operation for a standardization. It appears that a single tree mode cannot address the specificities of all possible uses and specifications of a system. In this paper, we review the tree modes which have been proposed, we discuss their problems and propose remedies. We make the reasonnable assumption that communicating ...
متن کاملParallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
The j-lanes tree hashing is a tree mode that splits an input message to j slices, computes j independent digests of each slice, and outputs the hash value of their concatenation. The j-pointers tree hashing is a similar tree mode that receives, as input, j pointers to j messages (or slices of a single message), computes their digests and outputs the hash value of their concatenation. Such modes...
متن کاملBatteries Included Features and Modes for Next Generation Hash Functions
The first generation of dedicated hash functions, starting with MD4 and including SHA-1 and the SHA-2 family, just defined plain hash functions. As it turned out, hash functions were employed for many applications the original hash function designers had not anticipated, and users thus defined their own modes of operation to satisfy their needs. Today’s designers and decision makers have the ch...
متن کاملA j-lanes tree hashing mode and j-lanes SHA-256
j-lanes hashing is a tree mode that splits an input message to j slices, computes j independent digests of each slice, and outputs the hash value of their concatenation. We demonstrate the performance advantage of j-lanes hashing on SIMD architectures, by coding a 4-lanes-SHA-256 implementation and measuring its performance on the latest 3 Generation Intel Core. For message ranging 2KB to 132KB...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Trans. Symmetric Cryptol.
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017