1. Efficient targeted key subset retrieval in fractal hash sequences
- Author
-
Thoshitha T. Gamage, Carl Hauser, and Kelsey Cairns
- Subjects
Secure Hash Algorithm ,Primary clustering ,Theoretical computer science ,Computer science ,Hash buster ,Hash function ,SWIFFT ,MDC-2 ,Merkle tree ,Hash-based message authentication code ,Rolling hash ,Hash tree ,Secure Hash Standard ,Collision resistance ,Collision attack ,Hash list ,SHA-2 ,Hash chain ,Cryptographic hash function ,Message authentication code ,Hash filter ,Key management ,Perfect hash function ,Double hashing ,Computer Science::Cryptography and Security - Abstract
This paper presents a new hash chain traversal strategy which improves performance of hash chain based one-time authentication schemes. This work is motivated by the need for efficient message authentication in low-latency multicast systems. Proposed solutions such as TV-OTS rely on hash chain generated values for keys, achieving reliable security by using only a small subset of generated values from each chain. However, protocols using hash chains are limited by the rate at which a hash chain traversal is able to supply keys. The new algorithm uses the same structure as Fractal Hash Traversal, but eliminates redundant operations incurred when used with applications such as TV-OTS. Performance is measured in terms of savings and is proportional to the chain-distance between consecutively retrieved values. For a distance of delta, we achieve Theta(delta_2(delta)) savings, which is shown analytically and supported by empirical tests.
- Published
- 2013
- Full Text
- View/download PDF