JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Parallel Implementation of LSH Using SSE and AVX
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Parallel Implementation of LSH Using SSE and AVX
Pack, Cheolhee; Kim, Hyun-il; Hong, Dowon; Seo, Changho;
  PDF(new window)
 Abstract
Hash function is a cryptographic primitive which conduct authentication, signature and data integrity. Recently, Wang et al. found collision of standard hash function such as MD5, SHA-1. For that reason, National Security Research Institute in Korea suggests a secure structure and efficient hash function, LSH. LSH consists of three steps, initialization, compression, finalization and computes hash value using addition in modulo , bit-wise substitution, word-wise substitution and bit-wise XOR. These operation is parallelizable because each step is independently conducted at the same time. In this paper, we analyse LSH structure and implement it over SIMD-SSE, AVX and demonstrate the superiority of LSH.
 Keywords
Hash function;LSH;parallelization;SIMD;
 Language
Korean
 Cited by
1.
The suggestion of new big data platform for the strengthening of privacy and enabled of big data, Journal of Digital Convergence, 2016, 14, 12, 155  crossref(new windwow)
 References
1.
X. Wang, A. C. Yao and F. Yao, "Cryptanalysis on SHA-1," CRYPTOGRAPHIC HASH WORKSHOP, October 2005.

2.
X. Wang, Y. L. Yin and H. Yu, "Finding Collisions in the Full SHA-1," In Advances in Cryptology-CRYPTO 2005, pp. 17-36, August. 2005.

3.
CRYPTOGRAPHIC HASH AND SHA-3 STANDARD DEVELOPMENT, http://csrc.nist.gov/groups/ST/hash/index.html

4.
Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G, "Keccak sponge function family main document," Submission to NIST (Round 2), 3, 30. 2009.

5.
SHA-3 STANDARDIZATION, http://csrc.nist.gov/groups/ST/hash/sha-3/sha-3_standardization.html

6.
NIST, "DRAFT FIPS PUB 202," May 2014.

7.
Kim, D. C., Hong, D., Lee, J. K., Kim, W. H., & Kwon, D, "Lsh: A new fast secure hash function family," In Information Security and Cryptology-ICISC 2014, Springer International Publishing, pp. 286-313, 2014.

8.
Intel Intrinsics Guide, http://software.intel.com/sites/landingpage/IntrinsicsGuide/

9.
Korea cryptographic forum. http://kcryptof orum.or.kr/

10.
eBASH, http://bench.cr.yp.to/ebash.html