The PHOTON family of lightweight Hash functions

作者: Jian Guo , Thomas Peyrin , Axel Poschmann

DOI: 10.1007/978-3-642-22792-9_13

关键词:

摘要: RFID security is currently one of the major challenges cryptography has to face, often solved by protocols assuming that an ontag hash function available. In this article we present PHOTON lightweight hash-function family, available in many different flavors and suitable for extremely constrained devices such as passive tags. Our proposal uses a sponge-like construction domain extension algorithm AES-like primitive internal unkeyed permutation. This allows us obtain most compact known so far (about 1120 GE 64-bit collision resistance security), reaching areas very close theoretical optimum (derived from minimal state memory size). Moreover, speed achieved also compares quite favorably its competitors. mostly due fact unlike previously proposed schemes, our simple analyze can derive tight bounds on number active Sboxes. kind usually not well suited ultra environments, but describe paper new method generating column mixing layer serial way, lowering drastically area required. Finally, slightly extend sponge framework order offer interesting trade-offs between preimage small messages, classical use-case hardware.

参考文章(72)
Julien Iguchi-Cartigny, Jean-Louis Lanet, Dieter Gollmann, Smart Card Research and Advanced Application ,(2011)
Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner, Cryptanalysis of ARMADILLO2 international conference on the theory and application of cryptology and information security. ,vol. 7073, pp. 308- 326 ,(2011) , 10.1007/978-3-642-25385-0_17
Thomas Fuhr, Thomas Peyrin, Cryptanalysis of RadioGatún fast software encryption. pp. 122- 138 ,(2009) , 10.1007/978-3-642-03317-9_8
Henri Gilbert, Thomas Peyrin, Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations Fast Software Encryption. pp. 365- 383 ,(2010) , 10.1007/978-3-642-13858-4_21
Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams, Secure Two-Party Computation Is Practical international conference on the theory and application of cryptology and information security. pp. 250- 267 ,(2009) , 10.1007/978-3-642-10366-7_15
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Sponge-based pseudo-random number generators cryptographic hardware and embedded systems. pp. 33- 47 ,(2010) , 10.1007/978-3-642-15031-9_3
Amir Moradi, Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang, Pushing the limits: a very compact and a threshold implementation of AES international cryptology conference. pp. 69- 88 ,(2011) , 10.1007/978-3-642-20465-4_6