Skip to main content

Group-theoretic hash functions

  • Cryptography
  • Conference paper
  • First Online:
Book cover Algebraic Coding (Algebraic Coding 1993)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 781))

Included in the following conference series:

Abstract

We discuss the security of group-theoretic hash functions for cryptographic purposes. Those functions display several attractive features: they can be computed quickly, and it can be shown that local modifications of the plaintext necessarily change the hashed values. We show why the first such proposal given in [Zém91] is not secure, by giving a probabilistic algorithm for finding collisions. However, our attack is based on the special form of the matrices which were originally chosen. We propose alternative schemes which seem to be immune to such attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Alon and V. D. Milman. λ1, isoperimetric inequalities for graphs, and superconcentrators. Journal of Comb. Theory Ser. B, 38:73–88, 1985.

    Google Scholar 

  2. P. Billingsley. Ergodic theory and information. J. Wiley and son, New York, London, Sydney, 1965.

    Google Scholar 

  3. L. Babai, W. M. Kantor, and A. Lubotsky. Small-diameter cayley graphs for finite simple groups. Europ. J. of Combinatorics, 10:507–522, 1989.

    Google Scholar 

  4. P. Camion. Can a fast signature scheme without secret key be secure? In proc. AAECC, pages 187–196. Springer-Verlag Lec. N. Comp. Sci. 228, 1987.

    Google Scholar 

  5. F. R. K. Chung. Diameters and eigenvalues. J. Am Math. Soc, 2:187–196, 1989.

    Google Scholar 

  6. I. B. Damgárd. Design principles for hash functions. In Crypto, 1989.

    Google Scholar 

  7. H. Daudé. Des fractions continues, la réduction des réseaux: analyse en moyenne. PhD thesis, Université de Caen, France, 1993.

    Google Scholar 

  8. J. D. Dixon. The number of steps in the euclidean algorithm. Journal of Number Theory, pages 414–422, 1970.

    Google Scholar 

  9. H. Diamond and J. Vaaler. Estimates for partial sums of continued fraction partial quotients. Pacific Journal of mathematics, 122(1):73–82, 1986.

    Google Scholar 

  10. P. Godlewski and P. Camion. Manipulations and errors, detection and localization. In Advances in Cryptology, EUROCRYPT-88, pages 96–106. LNCS 330 Springer-Verlag, 1988.

    Google Scholar 

  11. M. Girault, P. Toffin, and B. Vallée. How to guess t-th roots modulo n by reducing lattice points. In First international joint conference of ISSAC-88 and AAECC-6, July 1988.

    Google Scholar 

  12. G. H. Hardy and E. M. Wright. An introduction to the theory of numbers. Oxford University Press, 1979.

    Google Scholar 

  13. A. Ya. Khinchin. Continued fractions (english translation). The University of Chicago Press, 1964.

    Google Scholar 

  14. N. Koblitz. Introduction to Elliptic Curves and Modular Forms. Springer-Verlag, 1984.

    Google Scholar 

  15. A. G. Kurosh. The theory of groups. NED, 1960.

    Google Scholar 

  16. G. A. Margulis. Explicit constructions of graphs without short cycles and low density codes. COMBINATORICA, 2(1):71–78, 1982.

    Google Scholar 

  17. A. Selberg. On the estimation of fourier coefficients of modular forms. AMS Proc. Symp. Pure Math., 8:1–15, 1965.

    Google Scholar 

  18. J-P. Serre. A course in arithmetic. Springer-Verlag, 1973.

    Google Scholar 

  19. G. Zémor. Hash functions and graphs with large girths. In EUROCRYPT 91. LNCS 547 Springer-Verlag, 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

G. Cohen S. Litsyn A. Lobstein G. Zémor

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tillich, JP., Zémor, G. (1994). Group-theoretic hash functions. In: Cohen, G., Litsyn, S., Lobstein, A., Zémor, G. (eds) Algebraic Coding. Algebraic Coding 1993. Lecture Notes in Computer Science, vol 781. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57843-9_12

Download citation

  • DOI: https://doi.org/10.1007/3-540-57843-9_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57843-7

  • Online ISBN: 978-3-540-48357-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics