Hash functions in the dedicated-key setting: Design choices and MPP transforms

45Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the dedicated-key setting, one uses a compression function f: {0, 1}k × {0, 1}n+d → {0, 1}n to build a family of hash functions Hf: Κ × M → {0, 1} n indexed by a key space Κ. This is different from the more traditional design approach used to build hash functions such as MD5 or SHA-1, in which compression functions and hash functions do not have dedicated key inputs. We explore the benefits and drawbacks of building hash functions in the dedicated-key setting (as compared to the more traditional approach), highlighting several unique features of the former. Should one choose to build hash functions in the dedicated-key setting, we suggest utilizing multi-property-preserving (MPP) domain extension transforms. We analyze seven existing dedicated-key transforms with regard to the MPP goal and propose two simple new MPP transforms. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Bellare, M., & Ristenpart, T. (2007). Hash functions in the dedicated-key setting: Design choices and MPP transforms. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4596 LNCS, pp. 399–410). Springer Verlag. https://doi.org/10.1007/978-3-540-73420-8_36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free