A design principle for hash functions

  • Authors:
  • Ivan Bjerre Damgård

  • Affiliations:
  • -

  • Venue:
  • CRYPTO '89 Proceedings on Advances in cryptology
  • Year:
  • 1989

Quantified Score

Hi-index 0.00

Visualization

Abstract

We show that if there exists a computationally collision free function f from m bits to t bits where m t, then there exists a computationally collision free function h mapping messages of arbitrary polynomial lengths to t-bit strings.Let n be the length of the message, h can be constructed either such that it can be evaluated in time linear in n using 1 processor, or such that it takes time O(log(n)) using O(n) processors, counting evaluations of f as one step. Finally, for any constant k and large n, a speedup by a factor of k over the first construction is available using k processors.Apart from suggesting a generally sound design principle for hash functions, our results give a unified view of several apparently unrelated constructions of hash functions proposed earlier. It also suggests changes to other proposed constructions to make a proof of security potentially easier.We give three concrete examples of constructions, based on modular squaring, on Wolfram's pseudoranddom bit generator [Wo], and on the knapsack problem.