DocumentCode :
105050
Title :
Newmultivariate hash function quadratic polynomials multiplying linear polynomials
Author :
Youjiao Zou ; Wenping Ma ; Zhanjun Ran ; Shangping Wang
Author_Institution :
State Key Lab. of Integrated Service Networks, Xidian Univ., Xi´an, China
Volume :
7
Issue :
3
fYear :
2013
fDate :
Sept. 2013
Firstpage :
181
Lastpage :
188
Abstract :
In this study the authors propose a new multivariate hash function with HAsh Iterative FrAmework framework which we call the hash function quadratic polynomials multiplying linear polynomials (QML). The new hash function is made of cubic polynomials which are the products of quadratic polynomials and linear polynomials. The authors design the quadratic-polynomial part of the compression function based on the centre map of the multivariate public key cryptosystem Matsumoto-Imai cryptosystem (MI). The hash function QML can keep the three cryptography properties and be immune to the pre-image attack, second pre-image attack, collision attack, differential attack and algebraic attack. The required memory storage is about 50% of the one which is built of the cubic polynomials and their coefficients are random. On the avalanche effect, by experiments the authors get the result that about one half of the output bits are different when one input bit is changed randomly. The one-round diffusion of the hash function QML is twice of that of Blake. Also the authors simplify the matrixes of the new hash function, analyse the rationality and show the comparable data. Finally, the authors give the advice to the parameters of the new hash function and summarise the paper.
Keywords :
iterative methods; polynomials; public key cryptography; storage management; Blake; algebraic attack; centre map-based compression function; collision attack; cryptography properties; cubic polynomials; differential attack; hash function QML; hash iterative framework; memory storage; multivariate hash function quadratic polynomials multiplying linear polynomials; multivariate public key cryptosystem MI; one-round diffusion; second preimage attack;
fLanguage :
English
Journal_Title :
Information Security, IET
Publisher :
iet
ISSN :
1751-8709
Type :
jour
DOI :
10.1049/iet-ifs.2012.0035
Filename :
6587873
Link To Document :
بازگشت