Rotation-Symmetric Functions and Fast Hashing

Efficient hashing is a centerpiece of modern cryptography. The progress in computing technology enables us to use 64-bit machines with the promise of 128-bit machines in the near future. To exploit fully the technology for fast hashing, we need to be able to design cryptographically strong Boolean functions in many variables which can be evaluated faster using partial evaluations from the previous rounds. We introduce a new class of Boolean functions whose evaluation is especially efficient and we call them rotation symmetric. Basic cryptographic properties of rotation-symmetric functions are investigated in a broader context of symmetric functions. An algorithm for the design of rotation-symmetric functions is given and two classes of functions are examined. These classes are important from a practical point of view as their forms are short. We show that shortening of rotation-symmetric functions paradoxically leads to more expensive evaluation process.

[1]  Pieter Retief Kasselman,et al.  Analysis and design of cryptographic hash functions , 1999 .

[2]  Hans Dobbertin,et al.  Cryptanalysis of MD4 , 1996, Journal of Cryptology.

[3]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Joos Vandewalle,et al.  Fast Hashing on the Pentium , 1996, CRYPTO.

[6]  Bart Preneel,et al.  RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.

[7]  Hans Dobbertin Cryptanalysis of MD5 Compress , 1996 .

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[9]  Jennifer Seberry,et al.  Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract) , 1993, CRYPTO.

[10]  Jennifer Seberry,et al.  HAVAL - A One-Way Hashing Algorithm with Variable Length of Output , 1992, AUSCRYPT.

[11]  Kaisa Nyberg,et al.  On the Construction of Highly Nonlinear Permutations , 1992, EUROCRYPT.

[12]  Bruce E. Sagan,et al.  The symmetric group - representations, combinatorial algorithms, and symmetric functions , 2001, Wadsworth & Brooks / Cole mathematics series.

[13]  Jr. Burton S. Kalishi,et al.  The MD4 Message Digest Algorithm (Abstract) , 1991, EUROCRYPT.

[14]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[15]  Willi Meier,et al.  Nonlinearity Criteria for Cryptographic Functions , 1990, EUROCRYPT.

[16]  Réjane Forré,et al.  The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.

[17]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[18]  H. Feistel Cryptography and Computer Privacy , 1973 .

[19]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[20]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .