TY - JOUR
T1 - The power of primes
T2 - Security of authentication based on a universal hash-function family
AU - Alomair, Basel
AU - Clark, Andrew
AU - Poovendran, Radha
PY - 2010/10
Y1 - 2010/10
N2 - Message authentication codes (MACs) based on universal hash-function families are becoming increasingly popular due to their fast implementation. In this paper, we investigate a family of universal hash functions that has been appeared repeatedly in the literature and provide a detailed algebraic analysis for the security of authentication codes based on this universal hash family. In particular, the universal hash family under analysis, as appeared in the literature, uses operation in the finite field ℤ p. No previous work has studied the extension of such universal hash family when computations are performed modulo a non-prime integer n. In this work, we provide the first such analysis. We investigate the security of authentication when computations are performed over arbitrary finite integer rings ℤ n and derive an explicit relation between the prime factorization of n and the bound on the probability of successful forgery. More specifically, we show that the probability of successful forgery against authentication codes based on such a universal hash-function family is bounded by the reciprocal of the smallest prime factor of the modulus n.
AB - Message authentication codes (MACs) based on universal hash-function families are becoming increasingly popular due to their fast implementation. In this paper, we investigate a family of universal hash functions that has been appeared repeatedly in the literature and provide a detailed algebraic analysis for the security of authentication codes based on this universal hash family. In particular, the universal hash family under analysis, as appeared in the literature, uses operation in the finite field ℤ p. No previous work has studied the extension of such universal hash family when computations are performed modulo a non-prime integer n. In this work, we provide the first such analysis. We investigate the security of authentication when computations are performed over arbitrary finite integer rings ℤ n and derive an explicit relation between the prime factorization of n and the bound on the probability of successful forgery. More specifically, we show that the probability of successful forgery against authentication codes based on such a universal hash-function family is bounded by the reciprocal of the smallest prime factor of the modulus n.
KW - Authentication
KW - Cryptography
KW - Finite integer rings
KW - Universal hash-function families
UR - http://www.scopus.com/inward/record.url?scp=84858676329&partnerID=8YFLogxK
U2 - 10.1515/JMC.2010.005
DO - 10.1515/JMC.2010.005
M3 - Article
AN - SCOPUS:84858676329
SN - 1862-2976
VL - 4
SP - 121
EP - 148
JO - Journal of Mathematical Cryptology
JF - Journal of Mathematical Cryptology
IS - 2
ER -