Back to Search Start Over

Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3

Authors :
Atighehchi, Kévin
Bonnecaze, Alexis
Bonnecaze, Alexis
Equipe SAFE - Laboratoire GREYC - UMR6072
Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC)
Université de Caen Normandie (UNICAEN)
Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)
Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN)
Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)
Institut de Mathématiques de Marseille (I2M)
Aix Marseille Université (AMU)-École Centrale de Marseille (ECM)-Centre National de la Recherche Scientifique (CNRS)
Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)
Normandie Université (NU)-Normandie Université (NU)-Université de Caen Normandie (UNICAEN)
Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)
Normandie Université (NU)
Source :
IACR Transactions on Symmetric Cryptology, IACR Transactions on Symmetric Cryptology, 2017, 2017 (4), pp.212-239, IACR Transactions on Symmetric Cryptology, Pp 212-239 (2017), IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2017, 2017 (4), pp.212-239, IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 4; 212-239
Publication Year :
2017
Publisher :
HAL CCSD, 2017.

Abstract

Discussions about the choice of a tree hash mode of operation for a standardization have recently been undertaken. It appears that a single tree mode cannot address adequately all possible uses and specifications of a system. In this paper, we review the tree modes which have been proposed, we discuss their problems and propose solutions. We make the reasonable assumption that communicating systems have different specifications and that software applications are of different types (securing stored content or live-streamed content). Finally, we propose new modes of operation that address the resource usage problem for three representative categories of devices and we analyse their asymptotic behavior.<br />IACR Transactions on Symmetric Cryptology, Volume 2017, Issue 4

Details

Language :
English
ISSN :
2519173X
Database :
OpenAIRE
Journal :
IACR Transactions on Symmetric Cryptology, IACR Transactions on Symmetric Cryptology, 2017, 2017 (4), pp.212-239, IACR Transactions on Symmetric Cryptology, Pp 212-239 (2017), IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2017, 2017 (4), pp.212-239, IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 4; 212-239
Accession number :
edsair.doi.dedup.....d1071f53aed69dad271df2e5cf9cc16f