DocumentCode :
429735
Title :
Using the BCH construction to generate robust linear hash functions
Author :
Grossman, J.P. ; Jakab, Levente
Author_Institution :
Configuresoft, Inc., Colorado Springs, CO, USA
fYear :
2004
fDate :
24-29 Oct. 2004
Firstpage :
250
Lastpage :
253
Abstract :
Providing a single hash function for use across multiple applications is challenging due to the fact that different applications require different sizes of hashed values. An application-independent hash function must be robust in the sense that it must maintain good characteristics independent of the number of output bits which are used. In this paper we show how the BCH construction can be used to construct a single n→m bit linear hash function with the property that that the n→m´ bit subhash functions obtained by discarding the upper m - m´ output bits all have provably good collision avoidance properties. We apply this technique to the construction of a 256→128 bit hash function. We find that of the 256→m´ subhashes, over 78% have optimal minimum collision distances and all but one have a minimum collision distance within 2 of optimal.
Keywords :
BCH codes; binary codes; file organisation; linear codes; minimisation; BCH construction; collision avoidance; optimal minimum collision distances; robust linear hash functions; subhash functions; Application software; Collision avoidance; Computer science; Cryptography; Hamming distance; Hardware; Linear code; Memory management; Robustness; Springs;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory Workshop, 2004. IEEE
Print_ISBN :
0-7803-8720-1
Type :
conf
DOI :
10.1109/ITW.2004.1405309
Filename :
1405309
Link To Document :
بازگشت