Back to Search Start Over

Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3

Authors :
Kevin Atighehchi
Alexis Bonnecaze
Source :
IACR Transactions on Symmetric Cryptology, Pp 212-239 (2017)
Publication Year :
2017
Publisher :
Ruhr-Universität Bochum, 2017.

Abstract

Discussions about the choice of a tree hash mode of operation for a standardization have recently been undertaken. It appears that a single tree mode cannot address adequately all possible uses and specifications of a system. In this paper, we review the tree modes which have been proposed, we discuss their problems and propose solutions. We make the reasonable assumption that communicating systems have different specifications and that software applications are of different types (securing stored content or live-streamed content). Finally, we propose new modes of operation that address the resource usage problem for three representative categories of devices and we analyse their asymptotic behavior.

Details

Language :
English
ISSN :
2519173X
Database :
Directory of Open Access Journals
Journal :
IACR Transactions on Symmetric Cryptology
Publication Type :
Academic Journal
Accession number :
edsdoj.3614dce9951f42078516678c571e0c8f
Document Type :
article
Full Text :
https://doi.org/10.13154/tosc.v2017.i4.212-239