Looking Back at a New Hash Function View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2008-01-01

AUTHORS

Olivier Billet , Matthew J. B. Robshaw , Yannick Seurin , Yiqun Lisa Yin

ABSTRACT

We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explore the computational trade-off between the key schedule and encryption in a block cipher-based hash function and we illustrate our approach with a 256-bit hash function that has a hashing rate equivalent to the encryption rate of AES-128. The design extends naturally to a 512-bit hash function. More... »

PAGES

239-253

Book

TITLE

Information Security and Privacy

ISBN

978-3-540-69971-2
978-3-540-70500-0

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-70500-0_18

DOI

http://dx.doi.org/10.1007/978-3-540-70500-0_18

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1005511439


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Orange Labs, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "Orange Labs, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Billet", 
        "givenName": "Olivier", 
        "id": "sg:person.011100216333.64", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011100216333.64"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Orange Labs, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "Orange Labs, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Robshaw", 
        "givenName": "Matthew J. B.", 
        "id": "sg:person.07740641253.74", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07740641253.74"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Orange Labs, Issy les Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "Orange Labs, Issy les Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seurin", 
        "givenName": "Yannick", 
        "id": "sg:person.011724731171.01", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Independent Security Consultant", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Independent Security Consultant"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yin", 
        "givenName": "Yiqun Lisa", 
        "id": "sg:person.011326543363.17", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011326543363.17"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2008-01-01", 
    "datePublishedReg": "2008-01-01", 
    "description": "We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explore the computational trade-off between the key schedule and encryption in a block cipher-based hash function and we illustrate our approach with a 256-bit hash function that has a hashing rate equivalent to the encryption rate of AES-128. The design extends naturally to a 512-bit hash function.", 
    "editor": [
      {
        "familyName": "Mu", 
        "givenName": "Yi", 
        "type": "Person"
      }, 
      {
        "familyName": "Susilo", 
        "givenName": "Willy", 
        "type": "Person"
      }, 
      {
        "familyName": "Seberry", 
        "givenName": "Jennifer", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-70500-0_18", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-69971-2", 
        "978-3-540-70500-0"
      ], 
      "name": "Information Security and Privacy", 
      "type": "Book"
    }, 
    "keywords": [
      "hash function", 
      "dedicated hash functions", 
      "new hash function", 
      "encryption rate", 
      "AES-128", 
      "AES process", 
      "block cipher", 
      "key schedule", 
      "encryption", 
      "cipher", 
      "design", 
      "schedule", 
      "function", 
      "process", 
      "final stage", 
      "stage", 
      "rate", 
      "approach"
    ], 
    "name": "Looking Back at a New Hash Function", 
    "pagination": "239-253", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1005511439"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-70500-0_18"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-70500-0_18", 
      "https://app.dimensions.ai/details/publication/pub.1005511439"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-11-24T21:12", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221124/entities/gbq_results/chapter/chapter_145.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-70500-0_18"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70500-0_18'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70500-0_18'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70500-0_18'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-70500-0_18'


 

This table displays all metadata directly associated to this object as RDF triples.

111 TRIPLES      22 PREDICATES      42 URIs      35 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-70500-0_18 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N2bfae3c9252b4825a2a9ab9de9aff2a9
4 schema:datePublished 2008-01-01
5 schema:datePublishedReg 2008-01-01
6 schema:description We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explore the computational trade-off between the key schedule and encryption in a block cipher-based hash function and we illustrate our approach with a 256-bit hash function that has a hashing rate equivalent to the encryption rate of AES-128. The design extends naturally to a 512-bit hash function.
7 schema:editor N79f2deb9af3c4f11acbd4578154b3099
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf N02ed9e47219f4e0c870af5fa5455a83e
11 schema:keywords AES process
12 AES-128
13 approach
14 block cipher
15 cipher
16 dedicated hash functions
17 design
18 encryption
19 encryption rate
20 final stage
21 function
22 hash function
23 key schedule
24 new hash function
25 process
26 rate
27 schedule
28 stage
29 schema:name Looking Back at a New Hash Function
30 schema:pagination 239-253
31 schema:productId Nd7315b833976423f85ea7a62d0764f84
32 Nfe4c8b0d7f0b4f98a032e7d8970eecad
33 schema:publisher Nb8d98068e2ce4f9a9a3c8b5b3a5038ca
34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005511439
35 https://doi.org/10.1007/978-3-540-70500-0_18
36 schema:sdDatePublished 2022-11-24T21:12
37 schema:sdLicense https://scigraph.springernature.com/explorer/license/
38 schema:sdPublisher Ned56def996db4dfcaf8b0007f3144b17
39 schema:url https://doi.org/10.1007/978-3-540-70500-0_18
40 sgo:license sg:explorer/license/
41 sgo:sdDataset chapters
42 rdf:type schema:Chapter
43 N02ed9e47219f4e0c870af5fa5455a83e schema:isbn 978-3-540-69971-2
44 978-3-540-70500-0
45 schema:name Information Security and Privacy
46 rdf:type schema:Book
47 N19e64d15364e40a093b02e7f2637bc91 rdf:first sg:person.011724731171.01
48 rdf:rest Na39f5b5967994c3fa65bca9df1f7f4e4
49 N20846313f53247998887f32220c55b0c rdf:first N71758d1acabd4e5a9fabfccbf525507e
50 rdf:rest rdf:nil
51 N2bfae3c9252b4825a2a9ab9de9aff2a9 rdf:first sg:person.011100216333.64
52 rdf:rest N805e8dd727644017aaed0604c7e494f9
53 N43505ea75c2647f5aac0600eb164263e rdf:first N56a827ce2f6f499db4d5868968559828
54 rdf:rest N20846313f53247998887f32220c55b0c
55 N56a827ce2f6f499db4d5868968559828 schema:familyName Susilo
56 schema:givenName Willy
57 rdf:type schema:Person
58 N71758d1acabd4e5a9fabfccbf525507e schema:familyName Seberry
59 schema:givenName Jennifer
60 rdf:type schema:Person
61 N79f2deb9af3c4f11acbd4578154b3099 rdf:first Nf1d9317a42f6406faee78bb5ca09a3e2
62 rdf:rest N43505ea75c2647f5aac0600eb164263e
63 N805e8dd727644017aaed0604c7e494f9 rdf:first sg:person.07740641253.74
64 rdf:rest N19e64d15364e40a093b02e7f2637bc91
65 Na39f5b5967994c3fa65bca9df1f7f4e4 rdf:first sg:person.011326543363.17
66 rdf:rest rdf:nil
67 Nb8d98068e2ce4f9a9a3c8b5b3a5038ca schema:name Springer Nature
68 rdf:type schema:Organisation
69 Nd7315b833976423f85ea7a62d0764f84 schema:name doi
70 schema:value 10.1007/978-3-540-70500-0_18
71 rdf:type schema:PropertyValue
72 Ned56def996db4dfcaf8b0007f3144b17 schema:name Springer Nature - SN SciGraph project
73 rdf:type schema:Organization
74 Nf1d9317a42f6406faee78bb5ca09a3e2 schema:familyName Mu
75 schema:givenName Yi
76 rdf:type schema:Person
77 Nfe4c8b0d7f0b4f98a032e7d8970eecad schema:name dimensions_id
78 schema:value pub.1005511439
79 rdf:type schema:PropertyValue
80 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
81 schema:name Information and Computing Sciences
82 rdf:type schema:DefinedTerm
83 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
84 schema:name Data Format
85 rdf:type schema:DefinedTerm
86 sg:person.011100216333.64 schema:affiliation grid-institutes:grid.89485.38
87 schema:familyName Billet
88 schema:givenName Olivier
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011100216333.64
90 rdf:type schema:Person
91 sg:person.011326543363.17 schema:affiliation grid-institutes:None
92 schema:familyName Yin
93 schema:givenName Yiqun Lisa
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011326543363.17
95 rdf:type schema:Person
96 sg:person.011724731171.01 schema:affiliation grid-institutes:grid.89485.38
97 schema:familyName Seurin
98 schema:givenName Yannick
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01
100 rdf:type schema:Person
101 sg:person.07740641253.74 schema:affiliation grid-institutes:grid.89485.38
102 schema:familyName Robshaw
103 schema:givenName Matthew J. B.
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07740641253.74
105 rdf:type schema:Person
106 grid-institutes:None schema:alternateName Independent Security Consultant
107 schema:name Independent Security Consultant
108 rdf:type schema:Organization
109 grid-institutes:grid.89485.38 schema:alternateName Orange Labs, Issy les Moulineaux, France
110 schema:name Orange Labs, Issy les Moulineaux, France
111 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...