IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Robust Hash Functions and Their Applications in Non-Interactive Communications

Secure Robust Hash Functions and Their Applications in Non-Interactive Communications
View Sample PDF
Author(s): Qiming Li (Institute for Infocomm Research, Singapore)and Sujoy Roy (Institute for Infocomm Research, Singapore)
Copyright: 2012
Pages: 12
Source title: Crime Prevention Technologies and Applications for Advancing Criminal Investigation
Source Author(s)/Editor(s): Chang-Tsun Li (University of Warwick, UK)and Anthony T.S. Ho (University of Surrey, UK)
DOI: 10.4018/978-1-4666-1758-2.ch009

Purchase

View Secure Robust Hash Functions and Their Applications in Non-Interactive Communications on the publisher's website for pricing and purchasing information.

Abstract

A robust hash function allows different parties to extract a consistent key from a common fuzzy source, e.g., an image gone through noisy channels, which can then be used to establish a cryptographic session key among the parties without the need for interactions. These functions are useful in various communication scenarios, where the security notions are different. The authors study these different security notions in this paper and focus on forgery attacks, where the objective of the attack is to compute the extracted key (hash value) of a given message. This paper will examine information-theoretical security against forgery under chosen message attacks. The authors prove that it is not possible due to the entropy of the hash value of a given message can be reduced arbitrarily when sufficient message/hash pairs have been observed. In this regard, the authors give a computationally secure scheme, where it is computationally infeasible to compute the hash value even when its entropy may not be high.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom