Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding

M. Basil, W. Adi
{"title":"Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding","authors":"M. Basil, W. Adi","doi":"10.1109/EST.2015.15","DOIUrl":null,"url":null,"abstract":"Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash digest itself. This may be a result of transmission error or a possible abusing attack on the system. It is observed that most practical systems deploy a bit-size for the hash mappings which ranges from 160 bits to 512 bits or more. This is often over dimensioned to comply with standardized hash functions. Therefore, the hash function bits as output of pseudorandom mapping can be replaced partially and temporarily by some forward error correcting code ECC leaving the remaining bits for authentication without significant loss of authentication security. This work evaluates a practical example combining a simple interleaved Reed-Solomon single-byte error correcting code to replace a small part of the hash bits in the sent message. On the receiving side, the ECC bytes are used to correct errors and then removed and replaced by the remainder of the original hash value. The non-replaced large hash bits would contribute to let the miss-correction performance of the code approaches zero. This technique would reduce non-significantly or even negligibly the authentication level of the system, however would improve the overall system reliability in a great deal. No changes in the size and format of the existing authenticated message are necessary. The reliability improvement and security degradation in our proposed technique are evaluated and compared with the original designed values. Experimental simulations are also compared with those statistically computed under idealized randomizing assumptions for the hash function.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Sixth International Conference on Emerging Security Technologies (EST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2015.15","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash digest itself. This may be a result of transmission error or a possible abusing attack on the system. It is observed that most practical systems deploy a bit-size for the hash mappings which ranges from 160 bits to 512 bits or more. This is often over dimensioned to comply with standardized hash functions. Therefore, the hash function bits as output of pseudorandom mapping can be replaced partially and temporarily by some forward error correcting code ECC leaving the remaining bits for authentication without significant loss of authentication security. This work evaluates a practical example combining a simple interleaved Reed-Solomon single-byte error correcting code to replace a small part of the hash bits in the sent message. On the receiving side, the ECC bytes are used to correct errors and then removed and replaced by the remainder of the original hash value. The non-replaced large hash bits would contribute to let the miss-correction performance of the code approaches zero. This technique would reduce non-significantly or even negligibly the authentication level of the system, however would improve the overall system reliability in a great deal. No changes in the size and format of the existing authenticated message are necessary. The reliability improvement and security degradation in our proposed technique are evaluated and compared with the original designed values. Experimental simulations are also compared with those statistically computed under idealized randomizing assumptions for the hash function.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
联合使用哈希函数位和纠错编码提高系统可靠性
散列函数广泛部署在许多加密应用程序中,例如消息完整性检查、数字签名、消息认证码(mac)和许多其他应用程序。实际上,哈希函数主要用于检测篡改和证明消息的真实性。因此,如果哈希摘要与发送的摘要不匹配,这表明数据或哈希摘要本身被修改了。这可能是传输错误的结果,也可能是对系统的滥用攻击。据观察,大多数实际系统为哈希映射部署一个位大小,范围从160位到512位或更多。这通常是过维的,以符合标准化的散列函数。因此,作为伪随机映射输出的哈希函数比特可以被一些前向纠错码ECC部分地和暂时地替换,留下剩余的比特用于身份验证,而不会严重损失身份验证安全性。这项工作评估了一个实际的例子,结合一个简单的交错Reed-Solomon单字节纠错码来替换发送消息中的一小部分哈希位。在接收端,ECC字节用于纠正错误,然后删除并替换为原始哈希值的剩余部分。未替换的大哈希位将有助于使代码的纠错性能接近零。这种技术将不显著地或甚至可以忽略系统的身份验证级别,但是将大大提高整个系统的可靠性。不需要更改现有经过身份验证的消息的大小和格式。并与原设计值进行了可靠性改进和安全性降低的比较。实验模拟也与哈希函数在理想随机化假设下的统计计算结果进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Fault Detection and Correction in Processing AES Encryption Algorithm Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding Depth Assisted Palm Region Extraction Using the Kinect v2 Sensor Data Aggregation in Wireless Sensor Networks for Lunar Exploration Securing MEMS Based Sensor Nodes in the Internet of Things
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1