Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.6.111

Analysis of hash functions based on cellular automata  

Jeong Kitae (고려대학교 정보보호기술연구센터)
Lee Jesang (고려대학교 정보보호기술연구센터)
Chang Donghoon (고려대학교 정보보호기술연구센터)
Sung Jaechul (서울시립대학교)
Lee Sangjin (고려대학교 정보보호기술연구센터)
Abstract
A hash function is a function that takes bit strings of arbitrary length to bit string of fixed length. A cellular automata is a finite state machine and has the property of generating pseudorandom numbers efficiently by combinational logics of neighbour cells. In [1] and [7], hash functions based on cellular automata which can be implemented efficiently in hardware were proposed. In this paper, we show that we can find collisions of these hash functions with probability 0.46875 and 0.5 respectively.
Keywords
Cellular Automata; cryptanalysis; hash function; boolean function;
Citations & Related Records
연도 인용수 순위
  • Reference
1 이준석, 장화식, 이경현, '셀룰라 오토마타를 이용한 스트림 암호', 멀티미디어학회 논문지 제 5권 제2호, 2002. 4
2 M. Mihaljevic, 'An improved key stream generator based on the programmable cellular automata', Information and Commu-nication Security - ICICS'97, LNCS, Vol. 1334, pp.181-191, 1997   DOI
3 M. Mihaljevic, H. Imai, 'A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF (q) and Time-Variant Table', IEICE Trans. Fundamentals, Vol. E82-A, no.1, January 1999
4 K. Cattell, J. C. Muzio, 'Synthesis of One-Dimensional Linear Hybrid Cellular Automata', IEEE Trans. on Computer-Added Design of Integrated Circuits and System, Vol. 5, no.3, March 1996
5 신상욱, 윤재우, 이경현, '셀룰러 오토마타에 기반한 안전한 해쉬 함수', 한국통신정보보호학회, 제 8권, 제 4호, 1998. 12
6 S. Wolfram 'Cryptography with Cellular Automata', Advances in Cryptology- CRYPTO 85, LNCS Vol. 218, pp. 429-432, 1985
7 S. Wolfram, 'Cryptography with cellular automata', Internet request for momments 1321. R.L. Rivest, April 1992
8 K. Cattell, J. C. Muzio, 'Analysis of One-Dimensional Linear Hybrid Cellular Automata over GF(q)', IEEE Trans. Comput., Vol.45, pp.782-792, 1996   DOI   ScienceOn
9 M. Mihaljevic, Y. Zheng, H. Imai, 'A Cellular Automata Based Fast One-Way Hash Function Suitable for Hardware Implementation', Public Key Cryptography- Proceedings of PKC'98, LNCS, Vol. 1431, 1998
10 Y. Zheng, J. Pieprzyk, J. Sebery, 'HAVAL - a One-Way Hashing Algorithm with Variable Length of Output', Ad-vances in Cryptology-AUSCRYPT 92, LNCS, Vol.718, pp.83-104, 1993
11 P. P. Chaudhuri, D. R. Chowdhuri, S. Nandi, S. Chattopadhyay, 'Additive Cellular Automata: Theory and Applications', IEEE Press, New York, 1997
12 박창섭, '암호이론 보안', 대명사, 1999
13 S. Nandi. B. K. Kar, P. Pal Chaudhuri, 'Theory and Applications of Cellular Automata in Cryptography', IEEE Transaction on Computer, vol. 43, No.12, Dec-ember 1994