Lightweight Hashing Using Lesamnta-LW Compression Function Mode and MDP Domain Extension

This paper presents a block-cipher-based hashing scheme suitable for resource constrained devices. It uses the Lesamnta-LW compression function mode and the MDP domain extension. Then, this paper provides provable security analyses of the proposed scheme. It is shown that the proposed scheme is both collision-resistant and preimage-resistant up to the birthday bound in the ideal cipher model. It is also shown that the proposed scheme in the keyed-via-IV mode is a pseudorandom function if the underlying block cipher is a pseudorandom permutation. These results imply that the proposed scheme has the same level of security as the original Lesamnta-LW hashing scheme. Unlike the original Lesamnta-LW hashing scheme, the keyed-via-IV mode of the proposed scheme does not require output truncation. This property is useful when the proposed scheme is used for pseudorandom sequence generation.

[1]  Joos Vandewalle,et al.  Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.

[2]  Andrey Bogdanov,et al.  spongent: A Lightweight Hash Function , 2011, CHES.

[3]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[4]  Shoichi Hirose,et al.  An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW , 2012, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[5]  Willi Meier,et al.  Quark: A Lightweight Hash , 2010, Journal of Cryptology.

[6]  Thomas Peyrin,et al.  The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..

[7]  Andrey Bogdanov,et al.  Hash Functions and RFID Tags: Mind the Gap , 2008, CHES.

[8]  Shoichi Hirose,et al.  Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing , 2011, ICISC.

[9]  María Naya-Plasencia,et al.  Quark: A Lightweight Hash , 2010, CHES.

[10]  Daemen,et al.  2 The Keccak sponge functions , 2008 .

[11]  Rajeev Motwani,et al.  Randomized Algorithms , 1995, SIGA.

[12]  Mihir Bellare,et al.  A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications , 2003, EUROCRYPT.

[13]  Martijn Stam,et al.  Blockcipher-Based Hashing Revisited , 2009, FSE.

[14]  John P. Steinberger,et al.  The preimage security of double-block-length compression functions , 2011, IACR Cryptol. ePrint Arch..

[15]  Shoichi Hirose,et al.  A Simple Variant of the Merkle–Damgård Scheme with a Permutation , 2007, Journal of Cryptology.

[16]  John Black,et al.  An Analysis of the Blockcipher-Based Hash Functions from PGV , 2010, Journal of Cryptology.

[17]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[18]  Ingrid Verbauwhede,et al.  Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007, CHES.

[19]  John Black,et al.  Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV , 2002, CRYPTO.

[20]  Bart Preneel,et al.  MAME: A Compression Function with Reduced Hardware Requirements , 2007, CHES.