Skip to main content

Questions tagged [hash]

A cryptographic hash algorithm is a function which takes a variable size input and produces a fixed size output. The algorithm makes it difficult to find two inputs with the same output or reconstruct the input from the output.

Filter by
Sorted by
Tagged with
0 votes
0 answers
45 views

Are you aware of any examples of universal one-way function construction using a cellular automaton (for instance Turing-complete Rule 110) or of any sufficiently strong cryptographic hash function ...
kerzol's user avatar
  • 101
5 votes
0 answers
120 views

For a standard hash function $H$ like SHA-256, one can choose a secret message $M$, compute and publish $h=H(M)$, then prove knowledge of the preimage $M$ in zero knowledge [that is without disclosing ...
fgrieu's user avatar
  • 151k
2 votes
3 answers
289 views

I have read the Keccak team document about PRNG. When you hash with Keccak SHAKE the amount of random bytes you wish to return is unlimited, i.e. I can fetch() as ...
ojacomarket's user avatar
1 vote
0 answers
68 views

I am engaged in the translation of encrypted files. I have several files encrypted in the same way. The files consist of two parts: 48 byte header example - ...
Alba's user avatar
  • 11
0 votes
2 answers
114 views

Scenario Suppose I am designing CoolEncryptedCloudService. My users have a password. Using that password, I need to 1) authenticate users and 2) encrypt their data. Of course, I don't want to send the ...
Thore's user avatar
  • 128
4 votes
2 answers
141 views

The security strength of Hash based DRBG (Hash_DRBG and HMAC_DRBG) confuses me. Which property of Hash determines the security strength of DRBG? For example, which SHA2 algorithms can be used to ...
Citrus Poon's user avatar
1 vote
0 answers
80 views

We need to show $H'(x) =H_1(H_2(x))$ need not be a secure CRHF even if one of $H_1$ or $H_2$ is secure. The case when $H_2$ is insecure is clear as the pair of messages $m,m'$ given as output for $H_2$...
Crypto_Research's user avatar
6 votes
2 answers
1k views

I have a chunk of data that I need to round-trip through a service that I don't trust, and I want to make sure the data hasn't been tampered with in-transit. I have limited memory and limited storage, ...
Hounshell's user avatar
  • 163
1 vote
0 answers
49 views

I have been exploring this short-output universal hash function (the one referred to as digestMW() at the beginning of section 3.3). Based on a single comment in the paper, I think this hash function ...
cookiecipher's user avatar
2 votes
1 answer
188 views

I recently saw a specification of a hash function, which is based on a sponge. The hash function produces a $128$ bit message digest $H(X)$. Let's assume that $S$ is the final state of the absorbing ...
David Krell's user avatar
5 votes
3 answers
400 views

This question asks if a certain definition of unkeyed collision-resistant hash functions makes sense (i.e., it can be employed in usual security proofs) or, if not, what are its flaws. Some context is ...
LarryX's user avatar
  • 85
1 vote
0 answers
64 views

I am performing a cryptographic audit and reconstruction for a secure voting system inspired by Pret-a-voter. I currently have access to deterministic PRF mapping (Layer-1) and modulo/checksum filter (...
Rayan Humane's user avatar
0 votes
0 answers
68 views

For a 64bit Fowler–Noll–Vo non-cryptographic hash function variant, where the same message is hashed against multiple known initial value (FNV offset basis) and concated into a longer hash, is there a ...
AlexGuo1998's user avatar
0 votes
1 answer
61 views

Let us consider a stateful hash-based signature scheme (e.g. LMS or XMSS) with an $n$-bit hash function where each signature is composed of $x$ hash chains. Assuming an attacker has knowledge of $y &...
Raoul722's user avatar
  • 3,007
2 votes
1 answer
84 views

There is ParallelHash, a derived function part of SHA-3. It acts like an Extendable-output function (XOF) that can use multiple threads in multi-core CPUs. I can generate an (maybe) infinite keystream ...
przemyslawo's user avatar

15 30 50 per page
1
2 3 4 5
208