Back to Search
Start Over
Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3
- Source :
- IACR Transactions on Symmetric Cryptology, IACR Transactions on Symmetric Cryptology, 2017, 2017 (4), pp.212-239, IACR Transactions on Symmetric Cryptology, Pp 212-239 (2017), IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2017, 2017 (4), pp.212-239, IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 4; 212-239
- Publication Year :
- 2017
- Publisher :
- HAL CCSD, 2017.
-
Abstract
- Discussions about the choice of a tree hash mode of operation for a standardization have recently been undertaken. It appears that a single tree mode cannot address adequately all possible uses and specifications of a system. In this paper, we review the tree modes which have been proposed, we discuss their problems and propose solutions. We make the reasonable assumption that communicating systems have different specifications and that software applications are of different types (securing stored content or live-streamed content). Finally, we propose new modes of operation that address the resource usage problem for three representative categories of devices and we analyse their asymptotic behavior.<br />IACR Transactions on Symmetric Cryptology, Volume 2017, Issue 4
- Subjects :
- FOS: Computer and information sciences
lcsh:Computer engineering. Computer hardware
Computer Science - Cryptography and Security
Parallel algorithms
0211 other engineering and technologies
lcsh:TK7885-7895
02 engineering and technology
050601 international relations
SHA-3
Hash functions
Sakura
Keccak
SHAKE
Merkle trees
Live streaming
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
0202 electrical engineering, electronic engineering, information engineering
ComputingMilieux_MISCELLANEOUS
[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
021110 strategic, defence & security studies
Applied Mathematics
05 social sciences
020206 networking & telecommunications
0506 political science
Computer Science Applications
Computational Mathematics
Computer Science - Distributed, Parallel, and Cluster Computing
020201 artificial intelligence & image processing
Distributed, Parallel, and Cluster Computing (cs.DC)
Cryptography and Security (cs.CR)
Software
Subjects
Details
- Language :
- English
- ISSN :
- 2519173X
- Database :
- OpenAIRE
- Journal :
- IACR Transactions on Symmetric Cryptology, IACR Transactions on Symmetric Cryptology, 2017, 2017 (4), pp.212-239, IACR Transactions on Symmetric Cryptology, Pp 212-239 (2017), IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2017, 2017 (4), pp.212-239, IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 4; 212-239
- Accession number :
- edsair.doi.dedup.....d1071f53aed69dad271df2e5cf9cc16f