Evolutionary design of domain specific non-cryptographic hash functions

نویسنده

  • Marek Kidoň
چکیده

Hash functions are inseparable part of modern computer world. Fast associative arrays so popular among computer programmers for their robustness and simplicity, are based on them. Their performance greatly depends on their design and although their roots are deep in the past, the topic of designing a well performing hash function is still often discussed today. There is currently a plenty of exceptional implementations of generic hash functions and their numbers are rising. Such functions are not constrained to a concrete set of inputs, they perform on any input. On the other hand, there are use cases when input domain is known in advance. In such case, there is a room for an improvement by designing a specific hash function thus reaching better level of performance in comparison with a generic hash function. However designing a hash function is not a trivial task. There are no rules, standards or guides. In case of manual design the hash function author has to rely on his/her knowledge, experience, inventiveness and intuition. This fact opens up a space for different techniques such as evolutionary algorithms, an unconventional approach to solve certain problem inspired by the process of species reproduction. In this paper hash functions are designed for the domain of IP addresses using genetic programming. Genetic programming algorithm parameters are accurately chosen so the evolved functions will perform on its best. The experiments proved that the developed hash functions are better in comparison with generic hash functions in terms of both the speed and the performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming

The design of non-cryptographic hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this paper, we use the Genetic Programming paradigm to evolve collision free and fast hash functions. For achieving robustness against collision we use a fitness function based on a non-linearity concept, producing evolved hashes with a good degree of Avalanche Effe...

متن کامل

Hash function generation by means of Gene Expression Programming

Cryptographic hash functions are fundamental primitives in modern cryptography and have many security applications (data integrity checking, cryptographic protocols, digital signatures, pseudo random number generators etc.). At the same time novel hash functions are designed (for instance in the framework of the SHA-3 contest organized by the National Institute of Standards and Technology (NIST...

متن کامل

Cryptographic Boolean functions: One output, many design criteria

Boolean functions represent an important primitive in the design of various cryptographic algorithms. There exist several well-known schemes where a Boolean functions is used to add nonlinearity to the cipher. Thus, methods to generate Boolean functions that possess good cryptographic properties is an important research goal. Among other techniques, evolutionary computation has proved to be a w...

متن کامل

A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices

emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...

متن کامل

Revisiting Dedicated and Block Cipher based Hash Functions

A hash function maps a variable length input into a fixed length output. The hash functions that are used in the information security related applications are referred as cryptographic hash functions. Hash functions are being used as building blocks of many complex cryptographic mechanisms and protocols. Construction of a hash function consists of two components. First component is a compressio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016