Brand New Categories of Cryptographic Hash Functions: A Survey

سال انتشار: 1402
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 106

فایل این مقاله در 20 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JECEI-11-2_009

تاریخ نمایه سازی: 4 تیر 1402

چکیده مقاله:

kground and Objectives: Cryptographic hash functions are the linchpins of mobile services, blockchains, and many other technologies. Designing cryptographic hash functions has been approached by research communities from the physics, mathematics, computer science, and electrical engineering fields. The emergence of new hash functions, new hash constructions, and new requirements for application-specific hash functions, such as the ones of mobile services, have encouraged us to make a comparison of different hash functions and propose a new classification.Methods: Over ۱۰۰ papers were surveyed and reviewed in detail. The research conducted in this paper has included four sections; article selection, detailed review of selected articles, data collection, and evaluation of results. Data were collected as new hash function properties, new hash function constructions, new hash function categories, and existing hash function attacks which are used to evaluate the results.Results: This paper surveys seven categories of hash functions including block cipher-based functions, algebraic-based functions, custom-designed functions, Memory-hard Functions (MHFs), Physical Unclonable Functions (PUFs), quantum hash functions and optical hash functions. To the best of our knowledge, the last four mentioned categories have not been sufficiently addressed in most existing surveys. Furthermore, this paper overviews hash-related adversaries and six hash construction variants. In addition, we employed the mentioned adversaries as evaluation criteria to illustrate how different categories of hash functions withstand the mentioned adversaries. Finally, the surveyed hash function categories were evaluated against mobile service requirements.Conclusion: In addition to new classification, our findings suggest using PUFs with polynomial-time error correction or possibly bitwise equivalents of algebraic structures that belongs to post-quantum cryptography as candidates to assist mobile service interaction requirements.

نویسندگان

B. Sefid-Dashti

Department of Computer Engineering, University of Kashan, Kashan, Iran.

J. Salimi Sartakhti

Department of Computer Engineering, University of Kashan, Kashan, Iran.

H. Daghigh

Faculty of Mathematical Science, University of Kashan, Kashan, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • J. Hoffstein, J. Pipher, J. H. Silverman, An introduction to ...
  • H. C. A. van Tilborg, S. Jajodia, Eds., Encyclopedia of ...
  • J. Keller and S. Wendzel, “Reversible and plausibly deniable covert ...
  • W. Stallings, Cryptography and network security: principles and practice, sixth ...
  • C. Wang, S. J. Li, D. Wang, Q. H. Wang, ...
  • L. C. Washington, Elliptic curves: number theory and cryptography, second ...
  • R. C. Merkle, “A certified digital signature,” in Proc. Conf. ...
  • J. Rosenberg, D. L. Remy, Securing web services with WS-security: ...
  • A. Nadalin, C. Kaler, R. Monzillo, P. Hallam-Baker, Eds., Web ...
  • L. Demir, A. Kumar, M. Cunche, C. Lauradoux, “The pitfalls ...
  • M. Wang, M. Duan, J. Zhu, “Research on the security ...
  • S. Abed, R. Jaffal, B. J. Mohd, M. Al-Shayeji, “An ...
  • A. Kuznetsov, I. Oleshko, V. Tymchenko, K. Lisitsky, M. Rodinko, ...
  • A. M. Antonopoulos, Mastering bitcoin: Programming the open blockchain, ۲nd ...
  • J. Garay, A. Kiayias, N. Leonardos, “The bitcoin backbone protocol: ...
  • G. Wu, J. Han, Y. Guo, L. Liu, G. Ding, ...
  • M. S. Jan, M. Afzal, “Hash chain based strong password ...
  • A. A. Alkandari, I. F. Al-Shaikhli, M. A. Alahmad, “Cryptographic ...
  • B. Preneel, “The First ۳۰ Years of Cryptographic Hash Functions ...
  • G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, “Keccak,” ...
  • W. Stallings, “Inside SHA-۳,” IEEE Potentials, ۳۲(۶): ۲۶-۳۱, ۲۰۱۳ ...
  • A. Biryukov, D. Dinu, D. Khovratovich, “Argon۲: new generation of ...
  • S. Shen, X. Lee, R. Tse, W. Wong, Y. Yang, ...
  • V. Dolmatov, A. Degtyarev, “GOST R ۳۴.۱۱-۲۰۱۲: hash function,” RFC ...
  • R. Oliynykov, I. Gorbenko, O. Kazymyrov, V. Ruzhentsev, O. Kuznetsov, ...
  • S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk, “Cryptographic hash functions: A ...
  • I. Mironov, “Hash functions: Theory, attacks, and applications,” Microsoft Research, ...
  • R. Purohit, U. Mishra, A. Bansal, "A survey on recent ...
  • A. Narayanan, J. Bonneau, E. W. Felten, A. Miller, S. ...
  • M. Rjaško, “On chosen target forced prefix preimage resistance,” Tatra ...
  • B. Mennink, “Increasing the flexibility of the herding attack,” Inf. ...
  • E. Andreeva, B. Mennink, “Provable chosen-target-forced-midfix preimage resistance,” in Int. ...
  • A. R. Zamanov, V. A. Erokhin, P. S. Fedotov, “ASIC-resistant ...
  • H. Chen, Y. Wo, G. Han, “Multi-granularity geometrically robust video ...
  • R. L. Rivest, B. Agre, D. V. Bailey, C. Crutchfield, ...
  • R. Reischuk, M. Hinkelmann, “One-way functions - mind the trap ...
  • O. Goldreich, S. Goldwasser, S. Halevi, “Collision-free hashing from lattice ...
  • W. Hu, N. Xie, L. Li, X. Zeng, S. Maybank, ...
  • A. Appleby, Murmurhash ۳.۰, ۲۰۱۶. Last accessed: Aug. ۲۵, ۲۰۲۲ ...
  • C. Estébanez, Y. Saez, G. Recio, P. Isasi, “Performance of ...
  • S. Chen and C. Jin, “A second preimage attack on ...
  • M. Liskov, “Constructing an ideal hash function from weak ideal ...
  • B. Denton, R. Adhami, “Modern hash function construction,” in Proc. ...
  • Z. Bao, I. Dinur, J. Guo, G. Leurent, L. Wang, ...
  • M. Fischlin, A. Lehmann, D. Wagner, “Hash function combiners in ...
  • D. X. Charles, K. E. Lauter, E. Z. Goren, “Cryptographic ...
  • C. Petit, J. J. Quisquater, “Cryptographic hash functions and expander ...
  • B. A. Forouzan, Cryptography & network security. Maidenhead, England: McGraw ...
  • R. C. Merkle, “One way hash functions and DES,” in ...
  • I. B. Damgård, “A design principle for hash functions,” in ...
  • E. Andreeva, G. Neven, B. Preneel, T. Shrimpton, “Seven-property-preserving iterated ...
  • V. Shoup, “A composition theorem for universal one-way hash functions,” ...
  • I. Mironov, “Hash functions: From merkle-damgård to shoup,” in Proc. ...
  • E. Andreeva, C. Bouillaguet, O. Dunkelman, J. Kelsey, “Herding, second ...
  • J. Katz, Y. Lindell, Introduction to modern cryptography, ۲nd ed. ...
  • K. Malvoni, J. Knezovic, “Are your passwords safe: Energy-Efficient Bcrypt ...
  • H. J. Mun, S. Hong, J. Shin, “A novel secure ...
  • E. Conrad, S. Misenar, J. Feldman, Cissp Study Guide, ۲nd ...
  • J. Guo, S. Ling, C. Rechberger, H. Wang, “Advanced meet-in-the-middle ...
  • K. Aoki, Y. Sasaki, “Preimage attacks on one-block MD۴, ۶۳-step ...
  • S. Knellwolf, D. Khovratovich, “New preimage attacks against reduced SHA-۱,” ...
  • K. Aoki, Y. Sasaki, “Meet-in-the-middle preimage attacks against reduced SHA-۰ ...
  • K. Aoki, J. Guo, K. Matusiewicz, Y. Sasaki, L. Wang, ...
  • J. Kelsey, T. Kohno, “Herding hash functions and the Nostradamus ...
  • M. Stamp, R. M. Low, Applied cryptanalysis: breaking ciphers in ...
  • W. Stallings, Network security essentials: Applications and standards, ۴th ed. ...
  • G. V. Bard, Algebraic Cryptanalysis. Springer, ۲۰۰۹ ...
  • D. Jovanović, P. Janičić, “Logical analysis of hash functions,” in ...
  • F. Massacci, L. Marraro, “Logical cryptanalysis as a SAT problem,” ...
  • F. Legendre, G. Dequen, M. Krajecki, “Encoding hash functions as ...
  • D. De, A. Kumarasubramanian, R. Venkatesan, “Inversion attacks on secure ...
  • P. Morawiecki, M. Srebrny, “A SAT-based preimage analysis of reduced ...
  • E. Homsirikamol, P. Morawiecki, M. Rogawski, M. Srebrny, “Security margin ...
  • X. Wang, H. Yu, “How to break MD۵ and other ...
  • X. Wang, Y. L. Yin, H. Yu, “Finding collisions in ...
  • W. Vinci, T. Albash, A. Mishra, P. A. Warburton, D. ...
  • E. Knill, “Quantum computing,” Nature, ۴۶۳(۷۲۸۰): ۴۴۱-۴۴۳, ۲۰۱۰ ...
  • “D-Wave announces first order for ۲۰۰۰Q quantum computer,” ID Quantique, ...
  • “With new Microsoft breakthroughs, general purpose quantum computing moves closer ...
  • “Quantum simulator,” Google Quantum AI. Last accessed: Jan. ۱۰, ۲۰۲۳ ...
  • “qiskit.org,” Qiskit.org. Last accessed: Jan. ۱۰, ۲۰۲۳ ...
  • “D-wave ocean software documentation — ocean documentation ۵.۳.۰ documentation,” Dwavesys.com. ...
  • A. J. Abhari et al., “Scaffold: Quantum programming language,” Princeton ...
  • A. S. Green, P. L. Lumsdaine, N. J. Ross, P. ...
  • “Language-Integrated Quantum Operations: LIQUi|>,” Microsoft Research. Last accessed: Jan. ۱۰, ...
  • S. Patil, A. JavadiAbhari, C. F. Chiang, J. Heckey, M. ...
  • M. A. Nielsen, I. L. Chuang, Quantum Computation and Quantum ...
  • S. Imre, “Quantum computing and communications – Introduction and challenges,” ...
  • P. W. Shor, “Algorithms for quantum computation: Discrete logarithms and ...
  • L. K. Grover, “A fast quantum mechanical algorithm for database ...
  • L. K. Grover, “Quantum mechanics helps in searching for a ...
  • D. J. Bernstein, “Grover vs. mceliece,” in Third Int. Workshop ...
  • P. Wang, S. Tian, Z. Sun, N. Xie, “Quantum algorithms ...
  • X. Dong, S. Sun, D. Shi, F. Gao, X. Wang, ...
  • D. J. Bernstein, “Introduction to post-quantum cryptography,” in Post-Quantum Cryptography, ...
  • J. Watrous, “Zero-Knowledge against Quantum Attacks,” SIAM j. comput., ۳۹(۱): ...
  • E. Kashefi, I. Kerenidis, “Statistical Zero Knowledge and quantum one-way ...
  • S. J. Chang et al., “Third-round report of the SHA-۳ ...
  • U. Rührmair et al., “Efficient Power and Timing Side Channels ...
  • J. P. Aumasson, W. Meier, R. C. W. Phan, L. ...
  • A. Bauer, E. Jaulmes, E. Prouff, J.-R. Reinhard, J. Wild, ...
  • S. Y. Yan, Cryptanalytic attacks on RSA. Springer, ۲۰۰۸ ...
  • S. Contini, A. K. Lenstra, R. Steinfeld, “VSH, an efficient ...
  • M. J. O. Saarinen, “Security of VSH in the real ...
  • ISO/IEC ۱۰۱۱۸-۴:۱۹۹۸ Information technology — Security techniques — Hash-functions — ...
  • S. Kölbl, E. Tischhauser, P. Derbez, A. Bogdanov, “Troika: a ...
  • N. Mishra, S. H. Islam, S. Zeadally, “A comprehensive review ...
  • V. Manuceau, “About a fast cryptographic hash function using cellular ...
  • J. S. Teh, K. Tan, M. Alawida, “A chaos-based keyed ...
  • M. Zohner, M. Kasper, M. Stöttinger, S. A. Huss, “Side ...
  • C. Herder, M. D. Yu, F. Koushanfar, S. Devadas, “Physical ...
  • T. F. Lee, W. Y. Chen, “Lightweight fog computing-based authentication ...
  • A. P. Fournaris, N. Sklavos, “Secure embedded system hardware design ...
  • U. Rührmair, D. E. Holcomb, “PUFs at a glance,” in ...
  • C. Helfmeier, C. Boit, D. Nedospasov, J. P. Seifert, “Cloning ...
  • U. Rührmair, J. Sölter, “PUF modeling attacks: An Introduction and ...
  • J. Delvaux, I. Verbauwhede, “Side channel modeling attacks on ۶۵nm ...
  • A. Mahmoud, U. Rührmair, M. Majzoobi, F. Koushanfar, “Combined modeling ...
  • Y. Gao, S. F. Al-Sarawi, D. Abbott, “Physical unclonable functions,” ...
  • Y. G. Yang, J. R. Dong, Y. L. Yang, Y. ...
  • M. Ziiatdinov, “Quantum Hashing. Group approach,” Lobachevskii J. Math., ۳۷(۲): ...
  • H. Buhrman, R. Cleve, J. Watrous, R. de Wolf, “Quantum ...
  • F. Ablayev, A. Vasiliev, “Quantum hashing,” Cornell University Library, arXiv:۱۳۱۰.۴۹۲۲ ...
  • F. Ablayev, M. Ablayev, “Quantum hashing via ε-Universal hashing constructions ...
  • F. Ablayev, M. Ablayev, A. Vasiliev, “On the balanced quantum ...
  • L. Ren, S. Devadas, “Bandwidth hard functions for asic resistance,” ...
  • C. Percival, Stronger key derivation via sequential memory-hard functions. ۱-۱۶, ...
  • C. Percival, S. Josefsson, The scrypt password-based key derivation function. ...
  • X. Li, Z. Shao, M. Zhu, J. Yang, Fundamentals of optical ...
  • W. He, X. Peng, “Optical one-way hash function,” In: Advanced ...
  • W. Q. He, J. Y. Chen, L. B. Zhang, D. ...
  • A. Kumar, A. Fatima, N. K. Nishchal, “An optical Hash ...
  • L. D. Tsobdjou, S. Pierre, A. Quintero, “A new mutual ...
  • P. Kocher, J. Jaffe, B. Jun, P. Rohatgi, “Introduction to ...
  • S. N. Srirama, M. Jarke, W. Prinz, “Mobile web services ...
  • M. Asif, S. Majumdar, R. Dragnea, “Partitioning the WS execution ...
  • J. Li, W. Zhang, V. Dabra, K. K. R. Choo, ...
  • J. Kong, F. Koushanfar, “Processor-based strong physical unclonable functions with ...
  • J. P. Aumasson, S. Neves, Z. Wilcox-O’Hearn, C. Winnerlein, “BLAKE۲: ...
  • R. Chakraborty, A. Ghosh, V. E. Balas, A. A Elngar, Blockchain: ...
  • C. Dobraunig, M. Eichlseder, F. Mendel, M. Schläffer, “Ascon v۱.۲: ...
  • P. Podimatas, K. Limniotis, “Evaluating the Performance of Lightweight Ciphers ...
  • S. Blanc, A. Lahmadi, K. Le Gouguec, M. Minier, L. ...
  • W. K. Lee, K. Jang, G. Song, H. Kim, S. ...
  • J. E. Midwinter, Photonics in Switching, ۱st ed. Academic Press, ۱۹۹۳ ...
  • نمایش کامل مراجع