Abstract

AbstractWe present a large class of new Zémor-Tillich type hash functions whose target space is the finite group GL2(𝔽pn) for any prime p and power n. To do so, we use a novel group-theoretic approach that uses Tits’ “Ping-Pong Lemma” to outline conditions under which a set of matrices in PGL2(𝔽p((x))) generates a free group. The hash functions we form are secure against known attacks, and simultaneously preserve many of the desired features of the Zémor-Tillich hash function. In particular, our hash functions retain the mall modifications property.

Highlights

  • Hash functions are an essential part of many cryptographic schemes, principally as tools of message authentication and modification detection

  • [2] Gilles Zémor introduced the idea of building hash functions from Cayley graphs of large girth

  • We show that educated choices of generators produced using the Free Generators Theorem give hash functions that both are resistant to the previous attacks on the Zémor-Tillich hash function and

Read more

Summary

Introduction

Hash functions are an essential part of many cryptographic schemes, principally as tools of message authentication and modification detection. Notice that for p > 2, taking c = 0, a = 1, and b, a, and bto be −1, 0, and 1 in some order satisfies the (Simplified) Free Generators Theorem for any choice of d ≥ 0 Appendix A serves as a mathematical background and is auxiliary

Previous Work
Statement of the Free Generators Theorem
Notes on parameters and extensions of the Free Generators Theorem
The strategy for the proof of the Free Generators Theorem
Proof of the Free Generators Theorem
Properties of our hash functions
The small modifications property holds
Guarding against attacks using known identities
It follows then that α 2
Possible Attacks
Final Notes
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.