[25676] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: picking a hash function to be encrypted

daemon@ATHENA.MIT.EDU ("Hal Finney")
Mon May 15 20:19:28 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: ekr@rtfm.com, solinym@gmail.com
Cc: cryptography@metzdowd.com
Date: Mon, 15 May 2006 16:11:39 -0700 (PDT)
From: hal@finney.org ("Hal Finney")

Travis H. writes:
> Excellent point.  When I wrote that I had strongly universal hashes in
> mind, like UMAC, where the hash is chosen from a family of functions
> based on some secret data shared by sender and recipient.  I
> mistakenly conflated them with ordinary hashes (which they are, once
> you pick one).  Thanks for catching that.

A point of terminology, strong universal hash functions are different
than what you are probably thinking of.

UMAC is a MAC, not a SU hash function.  It uses an almost-SU hash function
in its construction, but that's different.

Universal hashes and their variants (see
http://www.cacr.math.uwaterloo.ca/~dstinson/universalhashingdefinitions.html
for a bibliography) are actually *weaker* than conventional hashes.
They can, in fact, be completely linear.  While you are right that the
hash is typically part of a parameterized family, once you pick one you
do not get an ordinary hash.  You are more likely to get an ordinary
polynomial that will not serve at all well as a crypto hash.

Hal Finney

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post