Secure and efficient constructions of hash, MAC and PRF for mobile devices

Yan Zhu, Shanbiao Wang, Di Ma, Hongxin Hu, Gail-Joon Ahn

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Numerous cryptographic techniques have been developed to be used on mobile devices for various security and privacy protections. However, these cryptographic primitives, working under different mathematical assumptions, tend to become more and more complex and intricate, which makes it increasingly more difficult for proper implementation and management. Thus, it is desired to simplify management and improve efficiency by means of designing a general function family to meet a variety of security requirements. In this paper, we present such a family of square functions, including SqHash, SqMAC and SqPRF, based on a specially truncated function (MSB or LSB). We further improve the efficiency of these algorithms by using 'circular convolution with carry bits' which makes parallel processing possible. We prove the security of these functions based on the privacy in hidden number problem and hard-core predicate of one-way function. We also show that the proposed schemes achieve better performance with a complexity reduction from O(n2) to O(kn/w) for n-bit message, k-bit output and w-bit word size.

Original languageEnglish (US)
Title of host publication2012 IEEE Global Communications Conference, GLOBECOM 2012
Pages949-954
Number of pages6
DOIs
StatePublished - 2012
Event2012 IEEE Global Communications Conference, GLOBECOM 2012 - Anaheim, CA, United States
Duration: Dec 3 2012Dec 7 2012

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other2012 IEEE Global Communications Conference, GLOBECOM 2012
Country/TerritoryUnited States
CityAnaheim, CA
Period12/3/1212/7/12

Keywords

  • Algorithm
  • Cryptography
  • Hash
  • Hidden Number Problem
  • MAC
  • Pseudorandom

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Secure and efficient constructions of hash, MAC and PRF for mobile devices'. Together they form a unique fingerprint.

Cite this