System and method for the calculation of a polynomial-based hash function and the erindale-plus hashing algorithm

ABSTRACT

The present invention is a polynomial-based hash function involving an ERINDALE-PLUS hashing algorithm. The function may involve several elements, including splitting with jumping, masking and bit string generation which generally involves representing an initial sequence of bits as a specially constructed set of polynomials. The means of achieving the function may involve methods that achieve improved speeds, such as requirements related to the size of the bit strings to cause the bit strings to be compatible with splitting and jumping and to involve iterated masking of a degree greater than 0. Additionally the function may involve recursive padding methods and a construction of MAC for considered hash function. The sum of the elements of the present invention is the provision of enhanced security as well as improved speed of processing for messages. Thus, messages processed by way of the present invention may be less prone to attack.

FIELD OF INVENTION

The present invention relates to a polynomial-based hash function and an ERINDALE-PLUS hashing algorithm to achieve optimum processing speed and enhanced security.

BACKGROUND OF THE INVENTION

Hash and Message Authentication Code (or MAC) algorithms are extremely important and, at the same time, the most vulnerable components of network security. These algorithms are used to provide a hash or MAC value that can serve as authentication of the integrity of a message that they have been appended to. A recipient user can perform the same hash or MAC operation on the received data to obtain statistical verification that the data has not been modified in transit. It should be noted that because hash and MAC algorithms produce tags of a fixed size for inputs of all lengths, the mapping is a many-to-one mapping, which results in “hash collisions”. Hash collisions result when two different messages have the same hash or MAC value. The design of the algorithms is intended to generate widely divergent hash or MAC values for slightly different inputs which provide an easy to recognize indication of message alteration.

A typical secure hash function is generally referred to as an iterated hash function and is based on a proposal by Merkle (R. C. Merkle, Authentication and Public Key systems, Ph. D. Thesis, Stanford University, June 1979, and R. C. Merkle, One way hash functions and DES, in: Advances in Cryptology—Crypto '89, ed. Brassard, pp. 428-446, Lecture Notes in Computer Science 435, Springer-Verlag, 1990). According to Merkle's proposal, the hash function takes an input string of bits and partitions the string into fixed-sized blocks of size k. Then a compression function takes k bits of the i^(th) partition and m bits from the previous calculation and calculates m bits of the (i+1)^(st) iteration. The output value of the last iteration (of size m) is the hash value. One common hash function is Message-Digest algorithm 5 (MD5) which generates 128-bit hash values. Flaws were identified in the MD5 algorithm in 1996, leading many organizations to suggest that MD5 may not be relied upon as secure.

The secure hash function SHA was designed by the National Security Agency (NSA) and issued by the National Institute of Standards and Technology (NIST) in 1993 as a Federal Information Standard (FIPS-180). A revised version called SHA-1, which specifies an additional round to the message expansion, was later issued in 1995 as FIPS-180-1. Further revisions, to the SHA family of algorithms include SHA-224, SHA-256, SHA-384, and SHA-512 which are occasionally collectively referred to as SHA-2.

SHA-1 produces a 160-bit hash. That is, every message hashes down to a 160-bit string. Given that there are an infinite number of messages that hash to each possible value, there are an infinite number of possible collisions. But because the number of possible hashes is so large, the odds of finding a collision by chance is small (one in 2⁸⁰ to be exact). Thus, using the brute-force method of finding collisions, the success of the attack depends solely on the length of the hash value.

In 2005 Prof. Xiaoyung Wang announced an attack on the NIST SHA-1 hash function and discovered that SHA-1 can be broken. In the same year she created a collisison attack on the MD5 hash function. Prof Wang's work revealed the vulnerabilities of the two hash functions most widely utilized by industries today. This revelation compelled the NIST to take steps to transition rapidly to the stronger SHA-2 family of hash functions.

By the recommendation of NIST, SHA-1 has been replaced by SHA-256, SHA-384, and SHA-512 (Secure Hash Signature Standard (SHS) (FIPS PUB 180-2)). However, as the algorithms SHA-1, SHA-256, SHA-384, and SHA-512 have common constructions, the same attack that has already been used in the case of SHA-1, can be applied to SHA-256, SHA-384, and SHA-512. Furthermore, there is no guarantee that the attack will not be further enhanced. Hence, all the systems of the SHA family may eventually be compromised.

When a MAC or hashing algorithm is compromised, the conventional recommendation is to abandon the algorithm and move to a more secure algorithm. This requires that electronic infrastructure used to generate the hash or MAC values be updated, which involves moving a large installed base to another system. For obvious reasons, including user inertia, this is a difficult task. Thus, there is a need for methods, computer programs and computer systems that, while utilizing hash and MAC algorithms (such as the MAC algorithms of the SHA family), are operable to provide an improved level of security. There is a further need for the methods, computer programs and computer systems that meet the aforesaid criteria and are further easy to implement to existing technologies and are computationally feasible.

Canadian Patent Application No. 2,546,148 disclose a secure hashing method consisting of: (1) representing an initial sequence of bits as a specially constructed set of polynomials as described herein, (2) transformation of this set by masking, (3) partitioning the transformed set of polynomials into a plurality of classes, (4) forming the bit string during the partitioning, (5) for each of the plurality of classes, factoring each of the polynomials and, so as to define a set of irreducible polynomials, collecting these factors in registers defined for each of the plurality of classes, (6) wrapping the values of the registers from the plurality of classes by means of an enumeration, (7) organizing the enumerations and the bit strings into a knapsack, and, finally, (8) performing an exponentiation in a group to obtain the hash value or the MAC value.

Because of the polynomial representation and masking transformation, in order to create a collision in accordance with the secure hash function described above, an attacker would be required to solve a collection of systems of non-linear iterated exponential equations over a finite field having specific constraints. In the case of a MAC, this difficulty is combined with the difficulty of opening the knapsack, and the difficulty of solving (a) the elliptic curve discrete logarithm referred to below, or (b) the discrete logarithm problem in the finite group, which further contributes to the security of the method of the present invention. As a result of the structure of the procedure, the resulting hash or MAC value has the following important attributes:

-   -   a) the length of the output can be changed simply by changing         the final step;     -   b) the computation is a bit-stream procedure as opposed to a         block procedure;     -   c) creating a collision requires the solution to several         difficult mathematical problems; and     -   d) varying some parameters (the number of the bit strings, or         the length of the bit strings, for example) allows easy         variation of the difficulty of creating a collision.

SUMMARY OF THE INVENTION

In one aspect the invention is a system directed at hash functions capable of averting attacks upon messages characterized in that it comprises: at least one computer; a message sent by a sender by way of the at least one computer; one or more polynomial-based hashing functions being operable by the at least one computer for application to the message to produce a hash output, utilizing one or more of the following elements: a splitting with jumping function; a masking function; a bit string generation function; and a padding function; one or more processing functions operable to generate an output that averts attacks upon the message; and wherein attacks upon the security of the message are averted through the application of the one or more polynomial-based hash functions and the one or more processing functions to the message.

In another aspect the invention is a method of application of a polynomial-based hash function to a message sent by a user from a computer, characterized in that it comprises the following steps: calculating a hash output utilizing the polynomial-based hash function by one or more of the following steps: applying a splitting with jumping function to the message to generate splitting with jumping outputs; applying a masking function to the splitting with jumping outputs to generate masking outputs; applying a bit string generation function to the masking outputs to generate bit strings outputs; and applying a padding function to the bit strings outputs to generate padding outputs; processing the padding outputs by one or more processing functions operable to generate a set of polynomials; performing the incorporation of the set of polynomials with the message to generate an output that averts attacks upon the security of the message.

In yet another aspect the invention is a computer system characterized in that it comprises software to program existing computer hardware to: receive a message sent by a sender; apply one or more polynomial-based hashing functions to the message to produce a hash output, utilizing one or more of the following elements: a splitting with jumping function; a masking function; a bit string generation function; and a padding function; process the hash output by one or more processing functions operable to generate an output that averts attacks upon the security of the message.

In still another aspect the invention is polynomial-based hash function operable by way of a computer program including computer instructions operable to averting attacks upon a message sent by a sender characterized in that it comprises: one or more of the following elements to produce a hash output, each facilitating a parameterized inner structure: a splitting with jumping function; a masking function; a bit string generation function; and a padding function; one or more processing functions operable to generate an output that averts attacks upon the security of the message.

In this respect, before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention will be better understood and objects of the invention will become apparent when consideration is given to the following detailed description thereof. Such description makes reference to the annexed drawings wherein:

FIG. 1 is a flow chart of the hashing algorithm of the present invention.

FIG. 2 is flow chart of the digital signal scheme of the present invention.

In the drawings, one embodiment of the invention is illustrated by way of example. It is to be expressly understood that the description and drawings are only for the purpose of illustration and as an aid to understanding, and are not intended as a definition of the limits of the invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The present invention is a polynomial-based hash function involving an ERINDALE-PLUS hashing algorithm. The invention may provide a secure means of transferring a message capable of functioning at a significant speed. The function can involve several elements, including splitting with jumping, masking and bit string generation which generally involves representing an initial sequence of bits as a specially constructed set of polynomials. The means of achieving the function involves methods that achieve improved speeds, such as requirements related to the size of the bit strings to cause the bit strings to be compatible with splitting and jumping and to involve iterated masking of a degree greater than 0. Additionally the function involves recursive padding methods and a construction of MAC for considered hash function. A paradigm of generating a lot of polynomial based hash functions with different inner structure, which was named the customization of the hash function is further applied as is a formula of organizing the enumerations and all types of the bit strings into a sum (knapsack). Messages processed by way of the present invention are protected and less prone to attack.

MAC construction is generally applied for secure hashing, namely hashing that involves a key. The present invention may provide a method of secure hashing that does not apply a MAC construction. In the present invention, the parameter that sets certain structures of the hashing algorithms can be used as a key. This is described below in reference to the ERINDALE and ERINDALE-PLUS hash algorithms. Such algorithms incorporate changeable or parameterized inner structures.

The present invention involves a method of processing the whole of a message file which results in faster and more secure processing. In particular, this processing involves procedures of splitting with jumping, masking, and bit string and table creation that are more powerful than those applied in the prior art. The present invention may provide a benefit over the prior art in that although a splitting step is known in the prior art, the present invention applies a splitting with jumping procedure.

The present invention offers additional benefits over the prior art as well. When a MAC or hashing algorithm is compromised, the conventional prior art recommendation is to abandon the algorithm and move to a more secure algorithm. This requires that the electronic infrastructure being used generates the hash or MAC values to be updated. This can involve moving a large installed base to another system. For several reasons, such as, for example user inertia, this is a difficult task. The present invention provides a method, computer program and system that may be operable to provide an improved level of security while utilizing hash and MAC algorithms (such as the MAC algorithms of the SHA family). Additionally, the present invention may be easily implemented to existing technologies and computationally feasible.

Another benefit of the present invention over the prior art is that it may construct one hashing algorithm with a changeable inner structure. When a hashing scheme becomes vulnerable it may be necessary to alter the algorithm. The present invention offers the possibility to enhance the security of the algorithm by changing certain parameters. The prior art does not provide this option. The present invention may facilitate enhancement of the inner structure of the algorithm and the result obtained may be a new more secure variant of the hash function. In such an embodiment of the present invention it may not be necessary to construct a new algorithm. Both the ERINDALE algorithm and ERINDALE-PLUS algorithm presented in this application facilitate such security enhancing by means of changing or enriching the structure of the algorithms applied by the present invention.

Masking may be utilized in the present invention whereby iterated equations over finite fields protect the message. The level of complexity of the masking may create difficulties that an attacker cannot overcome. Layering of the bit strings of the present invention, which may incorporate multiple layers rather than the two layers of the prior art, can create further difficulties for attackers. Each layer and dimension of the bit string procedure adds to the overall security of the present invention.

Prior art examples can be characterized as having a limited and narrow application to specific applications. The present invention may have a wider and more general application.

In one embodiment of the present invention, due to the specific procedures of splitting with jumping, masking and bit string and table creation utilized by the present invention to process the whole of a message file, elements of the hashing function may be tailored. For example, the polynomial-based hashing algorithm applied may be the ERINDALE-PLUS hashing algorithm which is applied to function in accordance with the present invention method.

The present invention offers further benefits over the prior art in that it is convenient for hardware implementation. The ERINDALE-PLUS algorithm may be parameterized more effectively than algorithms of the prior art. Additionally, the ERINDALE-PLUS algorithm may not require as much memory as the algorithms applied in the prior art.

Dedicated hardware elements, including custom Application Specific Integrated Circuits (ASIC) and digital signal processors (DSP), can be used in the implementation of the present invention. Alternatively, a general purpose computer can be programmed to execute the methods of the present invention.

Embodiments of the present invention may include the hashing algorithm, as shown in FIG. 1, or the digital signal scheme, as shown in FIG. 2. These are detailed below. However, a skilled reader will recognize that embodiments of the present invention may include variations of these steps.

Multiple Splitting with Jumping

In one embodiment of the present invention a method of splitting a file into a collection of polynomials of certain degree may be undertaken. The splitting implemented may allow for a variation in the speed of the algorithm function.

Prior art methods of splitting may be referred to as 0-jumping splitting because there is no gap between any two neighboring elements in the direct or forward splitting.

In an embodiment of the present invention the splitting procedure may be as follows: A number may be fixed, such as n. The splitting described herein will be referenced as q-jumping splitting for any 0<q<n. The description will be restricted to direct q-splitting however, the construction for backward q -splitting is analogous to this procedure.

To perform 2-jumping splitting a first step is the construction of:

M(1, n), M(3, n+2), M(5, n+4), M(7, n+6), M(9, n+8),  (1)

Note that for q=2 the above collection can be written as follows

M(1, n), M(1+q, n+(1+q)), M(1+2q, n+2(1+q)), M(1+3q, n+3(1+q)), M(1+4q, n+4(1+q)),  (2)

A general construction for any 0<q<n may be applied through the construction of the following collection:

M(1, n), M(1+q, n+(1+q)), M(1+2q, n+2(1+q)), M(1+3q, n+3(1+q)),  (3)

Splitting with jumping may then be defined as the collection of elements

M(1+q₁, n+q₁), M(1+q₁+q₂, n+(1+q₁+q₂)), M(1+q₁+q₂+q₃, n+(1+q₁+q₂+q₃)),  (4)

where 0<q_(i)<n and the numbers q_(i) are defined in accordance with certain algorithms. Two groups of such algorithms may be Group 1 or Group 2 described below. A skilled reader will recognize that other algorithms may be applied.

Group I

In one embodiment of the present invention an algorithm for forming q_(i) where q_(i) may depend on just one or a few elements M(j, j+n−1) for j≦i, i=1, . . . , k.

In general, a mapping

φ: {0, 1, . . . , 2^(n)−1}→{0, 1, . . . n−1}  (5)

may be formed and set

q _(i)=φ(ψ_(d)(M(j ₁ , j ₁ +n−1)), M(j ₂ , j ₂ +n−1), . . . , M(j ₁ , j ₁ +n−1),

where ψ_(d), in turn is an d-placed function

ψ_(d): {0, 1, . . . 2^(n)−1}× . . . ×{0, 1, . . . 2^(n)−1}→{0, 1, . . . , 2^(n)−1},  (6)

where 0<d<i.

For instance, it is possible to set q₁=0 and

q ₁=int(M(i−1, i+n−2)mod n,  (7)

or

q _(i)=int(M(i−1, i+n−2)⊕M(i−2, i+n−3)⊕ . . . ⊕ M(i−d, i−d+n−1))mod n  (8)

for the corresponding d>1.

Group II

In another embodiment of the present invention the second group may consist of algorithms for forming q_(i), in a framework in which q_(i) may depend either on one or a few elements M(j, j+n−1), and possibly one or a few elements CUR_(j), where j≦i, i=1, . . . , k. Separately, it is possible to consider the situation when q_(i) depends on just one or a few elements CUR_(j) for j≦i, i=1, . . . , k.

Examples of realizing the function ψ_(d) in this case for different d>1 are provided.

Setting q₁=0 and

q _(i)=#₁(M(i−1, i−n−2)),

where #₁(M(i−1, i−n−2)) denotes the number of 1-s in a sequence M(i−1, i−n−2) is one such example. In another example it is possible to set q_(i)=0 for i<d and then calculate

ω_(i) ^(d) =M(i−1, i−n−2)⊕CUR_(i−2)⊕CUR_(i−3) ^((*))⊕ ⊕CUR_(i−4) ^((**))⊕ . . . ⊕CUR_(i−d+2) ^((*, . . . ,*)),

where CUR_(i−3) ^((*)), CUR_(i−4) ^((**)), . . . , CUR_(i−d−2) ^((*, . . . , *)) are the elements of the iterated masking of the corresponding degrees. In general, any function defined on the collection of elements

M(i−1, i−n−2), CUR_(i−2), CUR_(i−3) ^((*)), CUR_(i−4) ^((**), . . . , CUR) _((i−d+2)) ^((*, . . . , *))

or some subsets of the collection can be considered. Note that the last element is of degree d.

Then using a mapping

φ: {0, 1, . . . , 2^(n)−1}→{0, 1, . . . , n}  (9)

it is possible to obtain

q _(i)=φ(int(ω_(i)))

for i=l+1, . . . , k.

In embodiments of the present invention, by choosing different mappings φ, it may be possible to change the processing speed for a message M. Indeed, assume that n=4 and consider two tables, by means of which we define two mappings, say φ₁ and φ₂.

TABLE 1 Function φ₁. x: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 φ₁: 1 0 1 0 2 1 3 2 1 0  2  1  3  1  0  2

TABLE 2 Function φ₂. x: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 φ₂: 2 3 1 2 3 0 1 3 2 3  2  1  2  3  2  3

The value may be defined as

${{ds}\left( {\phi,n} \right)} = {{1/2^{n}}{\sum\limits_{x = 0}^{2^{n} - 1}{\phi (x)}}}$

which may be called the jumping bit distance of a mapping φ. Thus,

-   ds(φ_(i), 4)=1.25, while -   ds(φ₂, 4)=2.065.

The larger the jumping bit distance, the faster it may process a message, since the number of elements processed during splitting with the mapping φ is, on average equal to k/ds(φ, n).

Thus, by varying n and φ, it is possible to change the speed of the splitting procedure and therefore the speed of the function. However, by increasing the jumping bit distance, we do not process a message as “thoroughly” as we would with a smaller jumping bit distance. The best way of defining a mapping φ is to construct a random sequence of 2^(n) elements {x, . . . , x₂ _(n) }, where 0≦x₁<n−1, i=1, . . . , 2^(n).

Iterated Masking Construction Requirements for Using Fields and Generators

In one embodiment of the present invention a construction of the iterated masking and specific requirements to the generators and the corresponding fields that are used in the construction, sufficiently improve the security of the function, as the relation between M_(i) and CUR_(i) become difficult to examine.

In one embodiment of the present invention, a first step of construction may be to calculate CUR^(n) ^(j) using generators δ and β of the corresponding fields GF₁(2^(n) ^(j) ) and GF₂(2^(n) ^(j) ). The fields GF₁(2^(n) ^(j) ) and GF₂(2^(n) ^(j) ) are generated in a standard way based on generators δ and β modulo different irreducible polynomials f and g of degree respectively. After calculating CUR_(i) ^(n) ^(j) , it may be possible to compute CUR_(i) ^(n) ^(j*) for i=1, . . . , k using the same generators δ and β.

When calculating the sequence CUR^(i) ^(n) ^(j*) based on the sequence CUR^(n) ^(j) , generators δ₁ and β₁ which are different from δ and β may be used. Moreover, in this case, irreducible polynomials f₁≠f and g₁≠g may be applied for generating the corresponding fields.

Moreover, calculating the iterated masking of degree, say, m, may use generators δ_(m) and β_(m) that are different from the previously-indexed generators δ_(m−1) and β_(m−1) that were applied for computing the polynomials of the iterated masking of degree m−1.

It is possible to further assume that f_(m−1) and g_(m−1) are the irreducible polynomials of degree n_(j) from which the fields GF₁(2^(n) ^(j) )_(m−1) and GF₂ (2^(n) ^(j) )_(m−1) may be generated with generators δ_(m−1) and β_(m−1), correspondingly.

Calculating the elements of the iterated masking of degree m, may use the fields GF₁(2^(n) ^(j) )_(m) and GF₂(2^(n) ^(j) )_(m) that are generated, respectively, modulo irreducible polynomials f_(m) and g_(m) of degree n_(j) such that f_(m)≠f_(m−1) and g_(m)≠g_(m−1).

All generators δ, δ₁, . . . , δ_(m) and β, β₁, . . . , β_(m) may be irreducible.

CUR Calculation I

In one embodiment of the present invention the multiple masking procedure overcomes the prior art in that it alters the formula for calculating the sequences CUR^(n) ^(j) , j=1, . . . , c.

In one embodiment of the present invention, the formula for calculating the elements of CUR may begin with the fixing of some n_(j), omit the upper index n_(j) for CUR^(n) ^(j) , and simply write CUR.

It is possible to apply the CUR expression for i=1, . . . , 2^(n)+1, however, the formula for the calculation of elements of CUR for i≦2^(n)+2 should consider any p₁(i), p₂(i) such that 1<p₁(i)≦2^(n) and 1<p₂(i)≦2^(n). We have

CUR_(i)=M_(i)⊕φ_(f)(δ^((int(M) ^(i−1) ^()+int(CUR) ^(d) ₁ ₀ ^()mod 2) ^(n) ⁾)⊕φ_(g)(β^((int(CUR) ^(i−1) ^()+int(CUR) ^(d) ₂ ₀ ^()mod 2) ^(n) ⁾),

where

d ₁ ⁰ =d ₁ ⁰(i)=i−2−(int(M _(i−1))modp₁(i), d ₂ ⁰ =d ₂ ⁰(i)=i−2−(int(CUR_(i−1))modp₂(i).  (10)

In particular, p₁(i) may be equal to p₁(j) and p₂(i) may be equal to p₂(j) for i, j≧2^(n)+2 and i≠j.

It is possible to define p₁(i) and p₂(i) in different ways for i≧2^(n)+2.

For instance, assume that the iterated masking of degree 1 is constructed. In this case, using the indexation for the corresponding iterated degree, for CUR⁰ and for i≧2^(n)+2 it is possible to set

p ₁ ⁰(i)=int(CUR*_(i−2−d) ₃ ₀ _((i))), p ₂ ⁰(i)=int(CUR*_(i−2−d) ₃ ₁ _((i)))

if int(CUR*_(i−2−d) ₃ ₀ _((i))) and int(CUR*_(i−2−d) ₃ ₀ ) are different from 0 and 1. Otherwise, it is possible to set

p ₁ ⁰(i)=c ₁ , p ₂ ⁰(i)=c ₂,

where c₁ and c₂ are some constants. For instance, we may set c₁=c₂=2^(n)−1.

It is also possible to define d₃ ⁰ (i), d₃ ¹(i) in different ways. For example, we may also set

d ₃ ⁰(i)=int(CUR_(i−t) ₁ ₀ ), d ₃ ⁰(i)=int(CUR_(i−t) ₂ ₀ ⁰)),

where 2≦t₁ ⁰≦2^(n)−1, 2≦t₂ ⁰≦2^(n)−1 are some constants, or it is possible to consider

t ₁ ⁰=int(CUR*_(i−1)), t ₂ ⁰=int (CUR*_(i−3))

For the case of iterated degree 1 we have

CUR*_(i)=CUR_(i) ⁰⊕φ_(f1)(δ^((int(CUR) ^(d) ¹ ₁ ^()mod 2) ^(n) ⁾)⊕φ_(g1)(β^((int(CUR*) ^(i−1) ^()+int(CUR*) ^(d) ² ₁ ^()mod 2) ^(n)) ),

where

d ₁ ¹ =d ₁ ²(i)=i−2−(int(CUR_(i−1) ⁰)mod p ₁ ⁰(i), d ₂ ¹ =d ₂ ¹(i)=i−2−(int(CUR*_(i−1))mod p ₂ ⁰(i).  (11)

It is possible to compute p₁ ¹(i) and p₂ ¹(i) by

p ₁ ¹(i)=int(CUR*_(i−2−d) ₃ ₂ _((i))), p ₂ ¹(i)=int(CUR*_(i−2−d) ₃ ₃ _((i))),

where d₃ ²(i)=int (CUR_(i−t) ₁ ₁ ⁰), d₃ ³(i)=int(CUR_(i−t) ₂ ₁ ⁰), and in this case we may compute

t ₁ ¹=int(CUR_(i−2) ⁰), t ₂ ¹=int(CUR_(i−3) ⁰),

for i=2^(n)+2, . . . , k, or t₁ ¹, t₂ ¹ are some constants such that

2≦t ₁ ¹≦2^(n)−1, 2≦t ₂ ¹≦2^(n)−1.

In a more simplified situation, d₃ ^(l(*))(i)=s(l(*)), where s(l(*)) is some constant different for different l(*). The construction considered above can be expanded on the iterated masking procedure of any degree.

CUR Calculation II

In yet another embodiment of the present invention a CUR calculation may be achieved involving various elements of CUR of the iterated masking of non-zero degree. It is possible to fix n and assume that iterated masking of degree l>0 is performed.

Assume that the condition

l+1<φ(2^(n)−1),

takes place, that is, the number of the generators greater or equal to l+2, then φ(x) is the Euler's totient function.

It is then possible to consider generators δ₀, δ₁, . . . , δ_(l) of the field GF (2^(n)). It is not necessary to change the expression for CUR_(i) calculation for i=1, . . . , 2^(n)+1, however the formula will be different for i>2^(n)+1.

It is possible to set

CUR_(i) =M _(i)⊕(δ₀ ⁰)^((int(M) ^(i−1) ^()+int(CUR) ^(d) ₀ ^()mod2) ^(n)) ⊕(δ₁ ⁰)^((int(CUR) ^(i−2) ^()+int(CUR) ^(d) ₁ ^()mod2) ^(n) ⁾⊕  (12)

⊕(δ₂ ⁰ ^()(int(CUR*) _(i−1) ^()+int(CUR) ^(d) ₃ ^()mod2) ^(n)) ⊕(δ₃ ⁰ ^()(int(CUR**) ^(i−3) ^()+int(CUR) ^(d) ₄ ^()mod2) ^(n)) ⊕  (12)

⊕(δ₁₊₁ ⁰ ^()(int(CUR) ^(i−l−1) _(l) ^()+int(CUR) ^(d) _(l+1) mod2 ^(n) ⁾,  (12)

where

d ₀ =i−2−int(M _(i−1)),

d ₁ =i−2−int(CUR_(i−1)),

d ₂ =i−2−int(CUR_(i−2)),

d ₃ =i−2−int(CUR*_(i−2)),

d _(i+1) =i−2−int(CUR**_(i−3)),

CUR_(i−l−1) CUR_(i−1) ¹ may be the (i−l−1)-th element of the iterated masking sequence of degree l and the expressions for the elements from CUR*, CUR**, . . . , CUR^(l) may be presented.

Again, the formula for calculating, for instance, CUR*_(i) for i=1, . . . , 2^(n)+1 may be the same as it was presented in prior art Canadian Patent No. 2,546,148.

Here is another way of forming CUR. For i=2^(n)+2, . . . , k it is possible to set

CUR*_(i)=CUR_(i)⊕(δ₀ ¹)^((int(CUR) ^(i−1) ^()+int(CUR*) ^(d) ₀ ^()mod2) ^(n)) ⊕(δ₁ ¹)^((int(CUR*) ^(i−1) ^()+int(CUR*) ^(d) ₁ ^()mod2) ^(n) ⁾⊕  (13)

⊕(δ₂ ¹)^((int(CUR**) _(i−2) ^()+int(CUR*) ^(d) ₂ ^()mod2) ^(n)) ⊕⊕(δ₀ ⁰)^((int(M) ^(i−1) ^()+int(CUR) ^(d) ₀ ^()mod2) ^(n)) ⊕(δ₁ ⁰)^((int(CUR) ^(i−2) ^()+int(CUR) ^(d) ₁ ^()mod2) ^(n) ⁾⊕

⊕(δ₂ ⁰)^((int(CUR*) _(i−1) ^()+int(CUR) ^(d) ₃ ^()mod2) ^(n)) ⊕(δ₃ ¹)^((int(CUR***) ^(i−3) ^()+int(CUR*) ^(d) ₃ )mod2 ^(n)) _(c))⊕

⊕(δ_(l) ¹)^((int(CUR) ^(i−1) ^(l) ^()+int(CUR*) ^(d) _(l) ^()mod2) ^(n)) ,  (13)

where

d ₀ =i−2−int(CUR_(i−1)),

d ₁ =i−2−int(CUR*_(i−1)),

d ₂ =i−2−int(CUR**_(i−2)),

d ₃ =i−2−int(CUR***_(i−3)),

d _(l) =i−2−int(CUR_(i−1) ^(l)),

Eventually for i=2^(n)+2, . . . , k it is possible to set

CUR_(i) ^(l)=CUR_(i) ^(l−1)⊕(δ₀ ^(l))^((int(CUR) ^(i−1) ^(l−1) ^()+int(CUR) ^(d) ₀ ^(l) ^()mod2) ^(n)) ⊕(δ₁ ^(l))^((int(CUR) ^(i−1) ^(l) ^()+int(CUR) ^(d) ₁ _(l) ^(l) ^()mod2) ^(n)   (14)

where

d ₀ ^(l) =i−2−int(CUR_(i−1) ^(l−1)),

d ₁ ^(l) =i−2−int(CUR_(i−1) ^(l)),

By CUR_(i−1) ^(l−1) and CUR_(i−1) ^(l) the i−1 elements of the sequences of degrees l−1 and l, correspondingly may be denoted.

Various constructions of CUR may be considered together with the modification presented above in “The modification of CUR calculation I” subsection. It is possible to consider the corresponding collections of p_(i) in this case.

It is also possible to vary the generators and the fields generated by modulo different irreducible polynomials for CUR of different degrees.

It means that δ_(i) ⁰ are generators of field constructed modulo irreducible polynomial f, which is different from irreducible polynomial, say g modulo of which field GF(2^(n)) was built when generators δ_(i) ¹ were used and so forth.

If condition l+1<φ(2^(n)−1) is not valid, it is possible to have totally φ(2^(n)−1)IR(n) possibilities to combine the generators and different fields. For instance, if n=4 then 24 possibilities may exist to use generators of different fields, while for n=5 then 270 possibilities may exist.

Therefore in this case it is possible to use different combinations of generators (with different fields) having totally φ(2^(n)−1)IR(n) possibilities. If the degree of iterated masking is greater than 24 it is better to move to n>4.

Partitioning Procedure

In one embodiment of the present invention it is possible to apply a procedure of partitioning the elements of CUR^(n) ^(j) between the collections of tables Tb^(n) ^(j) =1, . . . , c. This can cause the distribution procedure to be faster and thereby accelerate the algorithm.

It is possible to fix n and, without loss of generality, describe the new partitioning procedure for CUR.

Consider an iterating masking process of degree l≧0 and prepare two mappings T₀ and T₁

T₀: {0, . . . , 2^(n)−1}→Γ₀

T₁: {0, . . . , 2^(n)−1}→Γ₁

Where Γ₀ and Γ₁ are sets of random positive non-zero x<r. Recall that r is the number of tables between which the elements of CUR^(l) may be distributed. In general, for x, y ∈ {0, . . . , 2^(n)−1} and x≠y

T ₀(x)=T ₀(y)

and

T ₁(x)=T ₁(y).

However, it may happen that

T₀(x)≠T₁(x)

for all x ∈ (0, . . . , 2^(n)−1) and even Γ₀ ∩ Γ₁=Ø.

It is possible to begin hashing a message M (with jumping or without jumping) and consider CUR₁ ^(l), where l≧0 is the iterating masking of degree l. If M[1] is 0, it is possible to assign CUR₁ ^(l) to table with index T₀(int(CUR₁ ^(l))), otherwise it is possible to assign it to table with index T₁(int(CUR₁ ^(l)). Reference to the table to which CURL is assigned may be to the current table and its index may be denoted thereby T_(c) ₁ .

Denote by B[2] the first bit of element M₂, for which it is possible to compute CUR₂ ^(l). Again, If B[2] is 0 it is possible to assign CUR₂ ^(l) to table

T_(c) ₁ +T₀(int(CUR₂ ^(l))) mod r.

Otherwise, CUR₂ ^(l) will be sent to table with index

T_(c) ₁ +T₁(int(CUR₂ ^(l)) mod r.

On the i-th step of calculation, it is possible to assign CUM to the table with index

T_(c) ₁ +T_(c) ₂ + . . . +T_(c) _(i-1) +T₀(int(CUR_(i) ^(l)) mod r.

if B[i] is 0, and to the table with index

T_(c) ₁ +T_(c) ₂ + . . . +T_(c) _(i-1) +T₁(int(CUR_(i) ^(l)) mod r

otherwise.

Define another, more complicated way of calculating the indices of the tables to which it is possible to assign the corresponding elements of CUR^(l). Assume, for example, that l=3. On the first step of the calculation, if B[1] is 0, it is possible to assign CUR***₁ to the table with index

T₀(int(CUR₁⊕ CUR*₁⊕ CUR**₁⊕ CURT***₁)).

Otherwise, it may be assigned to the table with index

T₁(int(CUR₁⊕ CUR*₁⊕ CUR**₁⊕ CURT***₁)).

On the i-th step of calculation B[i] may be an estimate. If B[i] is 0, it is possible to send CUR***_(l) to the table with index

T_(c) ₁ +T_(c) ₂ + . . . +T_(c) _(i-1) (int(CUR_(i)⊕ CUR*_(i)⊕CUR**_(i)⊕ CUR***_(i)))mod r.

If not, it is possible to assign it to the table with index

T_(c) ₁ +T_(c) ₂ + . . . +T_(c) _(i-1) +T₁(int(CUR_(i)⊕ CUR*_(i)⊕ CUR**_(i)⊕ CUR***_(i)))mod r.

In general, for l>0 it may be possible to consider any l+1−placed function Cl

Cl: F₂ ^(n)× . . . ×F₂ ^(n)→F₂ ^(n)

and then, depending on B [i], calculate the index

T_(c) ₁ +T_(c) ₂ + . . . +T_(c) _(i-1) +T₀(int(Cl(CUR_(i), CUR*_(i), . . . , CUR_(i) ^(l)))mod r,

or

T_(c) ₁ +T_(c) ₂ + . . . +T_(c) _(i-1) +T₁(int(Cl(CUR_(i), CUR*_(i), . . . , CUR_(i) ^(l)))mod r.

of the table, to which CUM will be sent, i=1, . . . k.

In general, any function modulo r may be used to calculate the indices of the activated tables.

Requirements for the Lengths of the Bit Strings

In one embodiment of the present invention the bit strings may play an important role in the polynomial-based hash algorithm. The bit string requirements disclosed herein may increase security of the function, as they increase the number of inner states of the algorithm.

In one embodiment of the present invention it is possible to assign different sizes to different bit strings even when the considered bit strings are associated with the same table.

Thus, for tables Tb_(i) ^(n) ^(j) bit strings e_(ox) ^(n) ^(j) may be assigned that have different lengths sz_(ix) ^(n) ^(j) for a collection of indices x ∈ Θ_(i) ^(n) ^(j) associated to the table Tb_(i) ^(n) ^(j) for i=1, . . . , r^(n) ^(j) , j=1, . . . , c, where r_(n) ^(j) is a number of tables prepared for the corresponding j. So, for all i=1, . . . , r^(n) ^(j) , and j=1, . . . , c, it is possible now to have

sz_(ix) ^(n) ^(j) ≠sz_(iy) ^(n) ^(j)   (15)

for any x and y such that x≠y, and x, y ∈ Θ_(i) ^(n) ^(j) . Splitting with Jumping and the Bit Strings

In one embodiment of the present invention bit strings may be related to splitting with jumping. Embedding new bit strings into the construction of the hash function may lead to increasing the numbers of inner states of the function, which, in turn may increase the security of the function and allow more effective control of the inner structure of the function.

A first step may be to fix n and assume that splitting with jumping is to be performed. It means that by some algorithm integers q_(i) may be generated, such that 0≦q_(i)≦n, i=1, . . . , k, to form a sequence (4). A new collection of bit strings may be defined, which will be referenced as bit strings related to jumping. We will refer the collection of the bit strings as BSJ.

To each table Tb_(j), it is possible to generate another collection of bit strings ε_(js) of size δ_(js), j=1, . . . , r, s ∈ Ξ_(j), where Ξ_(j) is a collection of indices associated with a table Tb_(j), for which the bit strings ε_(js). are formed. A bit string ε_(i0) may be reserved that is not related to any particular element of table Tb_(i). If Ξ_(i) contains all the indices s=1, . . . , 2^(n) ^(j) , a special bit string ε_(i0) is not required, and therefore, in that case 0 ∉ Ξ_(i). Otherwise any of the Ξ_(i) contains 0. That is, a special bit string is always prepared. Therefore x ∈ Ξ_(i) and x≠0 means that for i=1, . . . , r, a bit string ε_(ix) is prepared and the bit string is associated to entry x−1 of table Tb_(i). Denote by ε_(js)(t) the t-th bit of a bit string ε_(js), for t=1, . . . , σ_(js), j=1, . . . , r, s ∈ Ξ_(j). Before processing, all of the bits within each of the bit strings are set to 0.

Updating the Bit Strings Related to Jumping: Scheme I

In one embodiment of the present invention it is possible to assume that the iterated masking procedure of degree l(*)≧0 is constructed and let CUR₁ ^(l(*)) be the first element. Assume also that a table Tb_(x) ₁ , is activated and denote y₁=int(CUR₁ ^(l(*))). Then if y₁+1 ∈ Ξ_(x) ₁ , it is possible to set

ε_(x) ₁ _(y) ₁ ₊₁(q ₁)=1,

otherwise

ε_(x) ₁ ₀(q ₁)=1,

Consider CUR₂ ^(l(*)) and let Tb_(x) ₂ be a table that was activated by y₂=CUR₂ ^(l(*)).

Then if y₂+1 ∈ Ξ_(x) _(x2) , it is possible to set

ε_(x) ₂ _(y) ₂ ₊₁(q ₁ +q ₂)=1,

otherwise

ε_(x) ₃ ₀(q ₁ q ₂)=1,

Here, q₁ and q₂ are the corresponding integers that were generated during splitting with jumping and, of course, it may be presumed that q₁+q₂<σ_(x) ₂ _(y) ₂₊₁ and q₁+q₂<σ_(x) ₂ ₀.

Assume further that CU_(m) ^(l(*)) is calculated and let Tb_(x) _(m) be a table that was activated by y_(m), where y_(m)=CUR_(m) ^(l(*). Then if y) _(m)+1 ∈ Ξ_(m) ₂ it is possible to set

ε_(x) _(m) _(y) _(m) ₊₁(q ₁ q ₂+ . . . +q_(m) mod σ_(x) _(m) _(y) _(m) ₊₁)=B ⊕1,

otherwise

ε_(x) _(m) ₀(q ₁ +q ₂+ . . . +q_(m) mod σ_(x) _(m) ₀)=B ⊕1,

where B was the (q₁+q₂+ . . . +q_(m)modσ_(x) _(m) ₀)-th bit value of the considered bit string before the update occurred.

Updating the Bit Strings Related to Jumping: Scheme II

In another embodiment of the present invention it is possible to consider one more scheme of updating the bit strings relating to jumping. According to Scheme I, presented above, the bit strings may be updated based on the values of q₁, . . . , q_(k), where k is a total number of elements of splitting a message M. Forming the procedure of updating the bit strings, may be based on the usage of M_(i),−i=1, . . . , k and various elements of CUR.

Prepare mapping

α: {0, . . . , 2^(n)−1}→Δ,

where Δ is a set of random integers greater than 0. In general, |Δ|≦2^(n).

Let again CUR₁ ^(l(*)) be the first element of the iterated masking procedure. Assume that a table Tb_(x) ₁ is activated and denote y₁=int(CUR₁ ^(l(*)). Then if y) ₁+1 ∈ Ξ_(x) ₁ , it is possible to set

ε_(x) _(i) _(y) ₁ ₊₁(α(int(M ₁)+int(CUR₁ ^(l(*))))mod σ_(x) ₁ _(y) ₁ ₊₁)=B ⊕1,

where B is the value of the ε_(x) _(i) _(y) _(i) ₊₁ (α(int(M₁)+int(CUR₁ ^(l(*)))) mod σ^(x) ₁ _(y) ₁ ₊₁)-th bit of bit string ε_(x) _(i) _(y) _(i) ₊₁ before the updating. If y₁+1 ∉ Ξ_(x) ₁ , it is possible to set

ε_(x) _(i) ₀(α(int(M ₁)+int(CUR₁ ^(l(*))))mod σ_(x) ₁ ₀)=B ⊕1,

where, again B is the corresponding bit value of bit string ε_(x) _(i) ₀ before the updating.

Assume, further that a table Tb_(x) _(i) , is activated by element CUR_(i) ^(l(*)) on the i-th step of processing. Denote y_(i)=int(CUR_(i) ^(l(*))) and assume that y_(i)+1∈ Ξ_(x) _(i) . Then it is possible to set

ε_(x) _(i) _(y) _(i) ₊₁(α(int(M _(i))+int(CUR₁ ^(l(*))))mod σ_(x) ₁ _(y) ₁ ₊₁)=B ⊕1,

otherwise,

ε_(x) _(i) ₀(α(int(M _(i))+int(CUR₁ ^(l(*))))mod σ_(x) _(i) ₀)=B ⊕1,

Remember that B is an appropriate bit value of the corresponding bit string before updating.

Any function a involving the elements M, CUR_(i) ^(l(*)), i=1, . . . , k, l(*), =0, . . . p may be utilized here.

After forming the tables and the bit strings related to jumping, a computation of values BSJ may be undertaken in accordance with

${{BSJ}(i)} = {\sum\limits_{x \in \Xi_{i}}{\left( {x + 1} \right){{int}\left( ɛ_{ix} \right)}}}$ i = 1, …  , r.

The Bit Strings Related to Iterated Masking

Another class of bit strings may naturally arise during an iterated masking procedure of degree l≧0, and this class may be formed in a few ways. Generally, realizing the iterated masking procedure of degree greater than 0 is a powerful way of increasing the security of the function. Furthermore, embedding the new class of bit strings into the construction of the function will increase its security even more. It is possible to refer the bit strings of the new class as BST bit strings of the corresponding degree.

Let M be a message. Let n be fixed and consider the iterating masking procedure of degree 1≧0. It is possible to calculate the elements of the sequences within CUR of degrees starting from 0 up to l. Denote the corresponding sequences CUR^(l(*)), where l(*)=0, 1, . . . , l.

It is clear that it is not necessary a priori to calculate all the elements of CUR⁰, CUR¹ and so forth. During the stages of the calculation it is possible to prepare only those elements of the corresponding sequences CUR^(l(*)) that are needed for the calculation of the elements of sequence CUR^(l(*)+1).

For example, for l=2 and for some i>2^(n)+2, to calculate CUR**_(i), it is possible to have calculated just

CUR*_(i), CUR*_(i−1)

and 2^(n) elements

CUR**_(j), CUR**_(j+1), . . . , CUR**_(j+2) _(n−1) ,

where j=i−2−2^(n).

Now to each table, it is possible to additionally associate, in general, l+1 layers or collections of new bit strings. These new bit strings may be referenced as the bit strings related to iterated masking of the corresponding degree, or simply the bit strings of the corresponding degree. These new bit strings will be related to the collections CUR^(l(*)) for l(*)=0, 1, . . . , l, where l(*) is the degree of the considered masking procedure.

First, let us define a layer of the bit strings of degree 0. Assume that a map may be defined

ρ₀: {0, 1, . . . , 2^(n)−1}→Y₀

where Y₀ is a collection of random non-zero positive integers. For instance, Y₀ may consist of random elements from 1 to 2^(n). In general, it may happen that

ρ₀(x)=ρ₀(y)

for x, y ∈ {0, 1, . . . , 2^(n)−1} and x≠y.

Denote, further, by v_(i) ⁰, a collection of bit strings associated to table Tb_(i), i=1, . . . r. Any such collection may contain no more than 2^(n) bit strings. Then let W_(i) ⁰ be a subset of {1, . . . , 2^(n)}. W_(i) ⁰ reflects the entries of table Tb_(i), for which the corresponding bit string will be defined, for i=1, . . . , r. That is, x ∈ W_(i) ⁰ means that for the x−1 entry of the table, a bit string v_(ix) ⁰ of length sz_(ix) ⁰. For any i=1, . . . , r if

W_(i) ⁰≠{1, . . . , 2^(n)}

one more special bit string is reserved v_(i0) that will not be associated to any entry of the table Tb_(i), is reserved. A special bit string for the table Tb_(i) may not be reserved if

W_(i) ⁰{1, . . . , 2^(n)}

i=1, . . . , r.

As usual, all of the bits for each of the bit strings are set to 0 before processing.

Denote by v_(js) ⁰(t) the t-th bit of the bit string v_(js) ⁰, j=1, . . . , r and s ∈ W_(j) ⁰. Assume that CUR₁ ⁰ has been calculated and assume also that a table Tb_(x) ₁ , is activated.

Set

y ₁=υ₀(int(CUR₁ ⁰).

Then for z₁=int(CUR₁ ⁰)+1, if z₂ ∈ W_(x) ₁ , it is possible to set

v _(x) ₁ _(z) ₁ (y ₁)=B ⊕1,

otherwise

v _(x) ₁ ₀(y ₁)=B ⊕1.

Here, B is the value of the y₁-th bit of the bit string v_(x) ₁ _(z) ₁ before updating. In our case, B is 0, as all of the bits in each of the bit strings are set to 0 from the beginning.

Assume that a sequence

CUR₁ ⁰, . . . , CUR_(j−1) ⁰, CUR_(j) ⁰

is calculated for some j>1 and denote

y ₁=ρ₀(int(CUR₁ ⁰)), . . . , y _(j)=υ₀(int(CUR_(j) ⁰)).

Assume also that all of the bit strings for the corresponding tables were processed when the elements

CUR₁ ⁰, . . . , CUR_(j−1) ⁰

were distributed. It is now possible to process CUR_(j) ⁰.

Assume that a table Tb_(xj) was activated by CUR_(j) ⁰ and let z_(j) ∈ W_(xj) ⁰, where z_(j)=int(CUR_(j) ⁰)+1. Then it is possible, for example, to set

v _(xjzj)(y ₁ + . . . +y _(j)mod sz _(x) _(j) _(z) _(j) ⁰)=B ⊕1.

If z_(j) ∉ W_(xj) ⁰, it is possible to set

v _(x) _(j) ₀(y ₁ + . . . +y _(j)mod sz _(x) _(j) ₀ ⁰)=B ⊕1.

Similarly, having defined mappings

ρ₁: {0, 1, . . . , 2^(n) −1}→Y ₁.

ρ₁: {0, 1, . . . , 2^(n) −1}→Y _(l).

it is possible to process the layers of bit strings v_(i) ¹, . . . , v_(i) ^(l), i=1, . . . , related to the iterated masking collections CUR¹, . . . , CUR^(l) of the corresponding degrees. Of course, the collections

Y₀Y₁, . . . , Y_(l)

of random non-zero positive integers may all be different. In addition, the mappings

ρ₀, ρ₁, . . . , ρ_(l)

may be all different as well.

Any other operation, different from y+ . . . +y_(j)mod sz_(x) _(j) _(z) _(i) ⁰ as presented above, may be used in forming bit strings. For example, it may be possible to apply the expression

(y₁+y₂+ . . . +y_(j))²mod sz_(x) _(j) _(z) _(i) ⁰

and so forth.

Having finished the procedure of forming the tables and bit strings for all layers, it is now possible to move to the next stage of hash-value calculation. This involves computing the special values BST. There may be at least two ways of computing BST.

Firstly, for each table Tb_(i), i=1, . . . , r, it is possible to compute BST in accordance with

${{BST}(i)} = {{\sum\limits_{x \in W_{i}^{0}}{\left( {x + 1} \right){{int}\left( v_{ix}^{0} \right)}}} + {2{\sum\limits_{x \in W_{i}^{1}}{\left( {x + 1} \right){{int}\left( v_{ix}^{1} \right)}}}} + {{\ldots++}\left( {l + 1} \right){\sum\limits_{x \in W_{i}^{l}}{\left( {x + 1} \right){{{int}\left( v_{ix}^{l} \right)}.}}}}}$

Secondly, assume that the sizes of the bit strings v_(js) ^(l(*)), j=1, . . . , r and s ∈ W_(j) ⁰ are equal for a particular table and layer, that is,

sz_(js) ₁ ⁰=sz_(x) _(js) ₂ ⁰,

for all s₁, s₂ such that s₁≠s₂, s₁, s₂ ∈ W_(j) ⁰, and sz_(js) ₁ ¹=sz_(js) ₂ ¹ for all s₁, s₂ such that s₁≠s₂, s₁, s₂ ∈ W_(j) ¹, and so forth.

It is possible that sz_(js) ^(l′(*)) may not be equal to sz_(js) ^(l(*)) even if both W_(j) ^(l′(*)) and W_(j) ^(l(*)) contain the same element s for any j=1, . . . , r and l(*)=0, . . . l, l′(*)=0, . . . , l, where l(*)≠l′(*).

In this case, BST (i) is computed as follows

BST(i)=int (⊕_({x∈W) _(i) _(0}) v_(ix) ⁰+2int(⊕_({x∈W) _(i) _(1}) v_(ix) ¹)+ . . . ++(l+1)int(61 _({x∈W) _(i) _(1}) v_(ix) ¹)

for i=1, . . . , r.

The symbol ⊕_({x∈W) _(i) _(0}) v_(ix) ⁰ may be used in the following context. For any Y={x₁, . . . , x_(k},)

⊕_({x∈Y})z_(x)=z_(x) ₁ ⊕ . . . ⊕ z_(x) _(k) .

Formula for Calculating Sums (Knapsacks)

In one embodiment of the present invention, having constructed new types of the bit strings, namely those related to jumping and iterated masking of all degrees, the formula for calculating the corresponding sum (knapsack) may be different. Thus, the formula of calculating a sum V for a fixed n, may be as follows

V=E ₁+(BS(1)+BSJ(1)+BST(1))+2(E ₂+(BS(2)+BSJ(2)+BST(2))+ . . . ++r(E _(r)+(BS(r)+(BSJ(r)+BST(r)).

The Recursive Consecutive Padding I

In embodiments of the present invention multiple methods for constructing new padding sequence for a message M may be applied. Such padding schemes may increase the security of the hashing algorithm because for any file it is possible to use a practically unique padding sequence.

Let M be a sequence of bits of size k and assume that M is not padded beforehand.

After splitting, masking, partitioning, and forming the bit strings, it is possible to obtain tables Tb_(i) ^(n) ^(j) , i=1, . . . , r_(n) _(j) , j=1, . . . , c, where r_(n) _(j) are the numbers of the tables generated for the corresponding In addition, for every table Tb_(j) ^(n) ^(i) it is possible to generate the bit strings e_(js) ^(n) ^(i) , j=1, . . . r_(n) _(i) , i=1, . . . , c, s ∈ Θ_(j) ^(n) ^(i) , where Θ_(j) ^(n) ^(i) is a collection of indices associated with a table Tb_(j) ^(n) ^(i) for which the corresponding bit strings are formed.

The collections of indices Θ_(j) ^(n) ^(i) may either be determined prior to the start of hashing or defined during the process of CUR distribution. In general, the sizes of the bit strings for different tables can be different. Assume that the procedure of forming tables and bit strings for a message M is completed for all n_(j). Denote by CUR_(l) _(j) ₁ ^(n) ^(j) the final values in the c collections

CUR^(n) ¹ , CUR^(n) ² , . . . , CUR^(n) ^(c) ,   (16),

respectively.

As it is possible to perform splitting with jumping for some or even for all n_(j), the indices l_(j) may be different for different n_(j), j=1, . . . , c.

Denote, further, by ζ₁ ^(n) ^(j) the indices of the tables that were activated by CUR_(l) _(j) ₁ ^(n) ^(j) for the corresponding j=1, . . . , c. Define

α₁ ^(n) ^(j) =μx[int(CUR_(l) _(j) ₁ ^(n) ^(j) )<x]  (17)

if there exists x ∈ Θ_(ζ) ₂ _(n) ^(j) ^(n) ^(j) such that x>CUR_(l) _(j) ₁ ^(n) ^(j) or

α₁ ^(n) ^(j) =0  (18)

otherwise. Here, μx means “the smallest x such that”.

It is then possible to pad M by consecutively processing the bits from the bit strings

e_(ζ) ₂ _(n) _(j) _(α) ₂ _(n) _(j) ^(n) ^(j)   (19)

for j=1, . . . , c.

Performing the padding steps, it is possible to summarize the number of bits within the bit strings (19) that were used during the padding steps for j=1, . . . , c. If the sum of the lengths of the bit strings is equal to 4096, it is possible to stop the padding and conclude the process of forming the tables and the bit strings by “wrapping up” the message M [1].

Assume, however, that all of the bit strings (19) for j=1, . . . , c are used, and assume, further, that the total sum of the lengths of the bit string is less than 4096.

In this case, denote by CUR_(l) _(j) ₂ the final values in the c collections

CUR_(p) ₁ ^(n) ¹ , CUR_(p) ₁ ^(n) ² , . . . , CUR_(p) ₁ ^(n) ^(c)   (20)

that were obtained after padding the message by bit strings (19). The index p₁ indicates that the first iteration of padding has already been performed while forming the collection of polynomials CUR_(p) ₁ ^(n) ^(j) , j=1, . . . , c.

Denote by ζ₂ ^(n) ^(j) the indices of the tables that were activated by CUR_(l) _(j) ₂ ^(n) ^(j) for the corresponding j=1, . . . , c. Define α₂ ^(n) ¹ in accordance with (17) and (19). It is possible now to use ζ₂ ^(n) ^(j) and CUR_(l) _(j) ^(n) ^(j) in 17 and 19 instead of ζ₁ ^(n) ^(j) and CUR_(l) _(j) ^(n) ^(j) respectively. That is,

α₂ ^(n) ^(j) =μx[int(CUR_(l) _(j) ₂ ^(n) ^(j) )<x]  (21)

if there exists x ∈ Θ_(ζ) ₂ _(n) ^(j) ^(n) ¹ such that x>CUR_(l) _(j) ₁ ^(n) ^(j) or

α₂ ^(n) ^(j) =0  (18)

otherwise. The second padding iteration may be started by consecutively using bits within the bit strings

e_(ζ) ₂ _(n) _(j) _(α) ₂ _(n) _(j) ^(n) ^(j)   (23)

for j=1, . . . , c and continuously calculate the total number of bits which were used to pad M. Again, when the total sum of the bits reaches 4096 it is possible to stop padding, otherwise the third, then the fourth iteration may be executed, and so on. The padding procedure terminates when the total number of bits used for padding is equal to 4096.

Non-Recursive Consecutive Padding

In another embodiment of the present invention, it is possible to apply a non-recursive consecutive padding scheme. This is a scheme, in a framework that involves the formation of a sequence of bits, by means of which it is possible to pad a message simply “copying” the bit strings one after another in accordance with the procedure described above.

In other words, the first bit string that will be used as the first “portion” of the padding sequence may be chosen and processed. After the processing of the bit string is completed, it is possible to take another bit string, process it and so forth. The procedure of choosing the bit strings that will form the padding sequence has been considered above in the context of recursive consecutive padding I.

The Partial Backward Splitting

In embodiments of the present invention it is possible to apply a partial backwards splitting procedure. In practice a file is read from disc to memory portion by portion. Usually such portions have a fixed size. For the purpose of the present invention it is possible to assume that the length of the portion may be fixed and it is possible to denote it by lp. So, let M be a hashed message.

It is possible to present M as a collection of the portions sp_(i), i=1, . . . , u, where sp_(i) is the first part (a portion) of a file M, sp₂ is the second portion of M, and so forth. Denote by len(sp_(i)) the length of portions sp_(i), i=1, . . . , u. Note that len(sp_(i))=lp for i=1, . . . , u−1 and len(sp_(u))≦lp, so that

|M|=(u−1)lp+len(sp _(u)).

The splitting procedure may be applied to a file presented as a collection of portions in the following way. Firstly, the direct splitting procedure (without or with jumping) will be applied to a padded file. For the direct splitting procedure it does not matter, in fact, that a file is presented in a form of a collection of portions. However the backward splitting procedure is modified now.

Denote by Op(sp_(i)) a collection of bits that may be obtained by inverting the portion sp_(i), i=1, . . . , u. For example, if a is a collection of bits

011010001110101,

where 0 is the first bit, 1 is the second bit and so forth, then

Op(a) is the following collection of bits

101011100010110.

Thus, the first bit of Op(a) is 1, the second bit is 0 and so forth.

Let M be a hashed message (a file) and assume that M may be presented as a collection of portions sp_(i) of length lp, i=1, . . . , it, so that

M=sp₁∥sp₂∥ . . . ∥sp_(u),

where by ∥ it is possible to denote the concatenation of the corresponding portions. Next it is possible to form M^(op), where

M ^(op) =Op(sp ₁)∥Op(sp ₂)∥ . . . ∥Op(sp _(u)).

Then it is possible to apply, for example, the direct splitting procedure (without or with jumping) to the obtained message (file). After completing the processing M and M^(op) it is possible to apply a padding procedure.

This direct splitting procedure applied to padded M^(op) may be referenced as the partial backward splitting.

The partial backward splitting is a convenient splitting procedure, for instance, for on-line processing, because it does not have to be applied to the whole file. At the same time considering the partial backward splitting increases the security of the function.

In general, the partial backward splitting for a few different n may be applied. It is also possible to consider a few partial backward splitting, some of which are with jumping and the rest are without jumping. In this case it is possible to consider a few partial backward splitting for the same n, one of which is without jumping and the rest are with different jumping conditions. These different conditions can be defined by considering different jumping tables. It may also be possible to consider a few partial backward splitting with the same n and with different jumping tables.

MAC Construction

In one embodiment of the present invention a MAC construction for the polynomial-based hashing function is introduced that is based on new classes of the bit strings.

Let S be a key of size l and denote by S_(i) the i-th bit of sequence S, i=1, . . . , l. Choose, further, some numbers u_(j)<2^(n) ^(j) , where j=1, . . . , c. The numbers u_(j) will define the number of bit strings associated to each j=1, . . . , c. These numbers are determined beforehand.

Assume that l<r_(i), where r_(i) is a number of tables prepared for n_(i).

If the goal is to connect the number of bit strings associated to the tables related to n₁ to the bits of the sequence S_(i), to realize this connection, it is possible to determine the number of the bit strings Φ_(i) ^(n) ¹ associated to a table Tb_(i) ^(n) ¹ in accordance with the following rule: For ∀i≦l it is possible to set

$\begin{matrix} {\Phi_{i}^{n_{1}} = \left\{ \begin{matrix} {u_{1},} & {{{{if}\mspace{14mu} S_{i}} = 1};} \\ {{u_{1} - 1},} & {{{if}\mspace{14mu} S_{i}} = 0.} \end{matrix} \right.} & (24) \end{matrix}$

For the remaining i=l+1, . . . , r₁ it is possible to set Φ_(i) ^(n) ¹ =u₁.

Assume now that

$l < {\sum\limits_{j = 1}^{c}r_{j}}$

and suppose that for t and m^(n) ^(t) such that 1≦t≦c and 1≦m^(n) ^(t) ≦r^(n) ^(t) , it happens that

$l < {{\sum\limits_{j = 1}^{n_{t} - 1}r_{j}} + {m^{n_{t}}.}}$

It is possible to process the following settings step by step.

For i=1, . . . , r₁, it is possible to set

$\begin{matrix} {\Phi_{i}^{n_{1}} = \left\{ \begin{matrix} {u_{1},} & {{{{if}\mspace{14mu} S_{i}} = 1};} \\ {{u_{1} - 1},} & {{{if}\mspace{14mu} S_{i}} = 0.} \end{matrix} \right.} & (25) \end{matrix}$

Then for i=1, . . . , r₂, and ƒ₁=r₁, it is possible to set

$\begin{matrix} {\Phi_{i}^{n_{2}} = \left\{ \begin{matrix} {u_{2},} & {{{{if}\mspace{14mu} S_{f_{1} + i}} = 1};} \\ {{u_{2} - 1},} & {{{if}\mspace{14mu} S_{f_{1} + i}} = 0.} \end{matrix} \right.} & (26) \end{matrix}$

for i=1, . . . , r₂, and ƒ₁=r₁,

$\begin{matrix} {\Phi_{i}^{n_{t} - 1} = \left\{ \begin{matrix} {u_{n_{t} - 1},} & {{{{if}\mspace{14mu} S_{f_{n_{t} - 2} + i}} = 1};} \\ {{u_{n_{t} - 1} - 1},} & {{{if}\mspace{14mu} S_{f_{n_{t} - 2} + i}} = 0.} \end{matrix} \right.} & (27) \end{matrix}$

Here i=1, . . . , r_(n) _(t) ⁻¹, and ƒ_(n) _(t) ⁻²=ƒ_(n) _(t) ⁻³+r_(n) _(t) ⁻².

It is possible to complete the process by setting

$\begin{matrix} {\Phi_{i}^{n_{t}} = \left\{ \begin{matrix} {u_{n_{t}},} & {{{{if}\mspace{14mu} S_{f_{n_{t} - 1} + i}} = 1};} \\ {{u_{n_{t}} - 1},} & {{{if}\mspace{14mu} S_{f_{n_{t} - 1} + i}} = 0.} \end{matrix} \right.} & (28) \end{matrix}$

for i=1, . . . , m^(n) ^(t) and ƒ_(n) _(t) ⁻¹=ƒ_(n) _(t) ⁻²+r_(n) _(t) ⁻¹

The number of bit strings for the remaining tables are unchanged. Recall that from the very beginning u_(j) was defined to be the number of the bit strings for all the tables for the corresponding j=1, . . . , c.

The Parameterization of the Hash Function

In one embodiment of the present invention, to parameterize the considering hash function, the aim of the parameterization is to generate a wide class of the hash function with different properties. There are a few possibilities to parameterize the function.

The Parameterization of the Size of a Hash Value

According to the NIST requirements a hash value can be 160, 224, 256, 384, or 512 bits of size. The size of final hash value r can be changed by changing GF*(2^(t)).

It may be necessary to change one more parameter, namely, the sizes of the bit strings, to generate a hash value of the corresponding size in order to make sure that hash values are correctly generated even for the messages of a small size. There are two possibilities to realize the correspondence between the size of a hash value and the sizes of the bit strings.

Every time when the size of a hash value is changed it is also possible to change the minimal size of the bit strings. For example, if for instance the size of a hash value 256 bits is sent, the minimal sizes of the bit strings should be greater or equal to 256 bits.

In yet another embodiment of the present invention, an additional means of realizing the correspondence between the size of a hash value and the sizes of the bit strings may be applied. Assume that it is possible a priori to know that the possible biggest size of a hash value, generated by the hash value within some frame of time is τ. For instance, let τ=384 bits, which means that it is possible to generate the hash values of the sizes 160, 224, 256 and 384 bits. In this case it is possible to set the minimal sizes of the bit strings as equal to 384 and it is not necessary to change the sizes of the bit strings within a considered time frame.

Parameterization of the Speed of the Function

In another embodiment of the present invention, parameterization of the speed of the function may be achieved by choosing splitting with jumping and defining mappings cp with the larger jumping bit distance (see the section “Splitting with jumping”).

Parameterization of the Security of the Function

The prior art points to several means of increasing the security of the algorithm function. For example, such as increasing: the number of tables; the number and the sizes of the bit strings prepared for the tables; and the degree of the iterated masking. Additionally, the security of the function can be achieved by increasing the value c. That is increasing the number of n_(j), j=1, . . . , c, which is processed in all steps of the algorithm computation.

A relatively “cheap” method of increasing the security is achieved by the following method. Assume that it is possible to realize the iterated masking of degree l>0. The security of the function can be increased by means of increasing the number of layers of the bit strings that are reserved for the tables. If, for instance l=3, it may be possible to reserve up to 4 layers of the bit strings, related to CUR^(l(*)), l(*)=0, . . . , 3. It may not be necessary to reserve all four layers. However, by increasing the number of the layers the security may be increased significantly. At the same time increasing the number of the layers leads to increasing the consumed memory, however it only minimally affects the speed of the function.

There is one more important moment related to the layers of the bit strings. Assume that only two layers of the bit strings are reserved for the iterated masking procedure of degree, say 4. There arises the question of choosing the two values of l(*), for which layers are reserved. Keeping in mind that the relation between the elements of splitting and the corresponding elements of the iterated masking of higher degree is more difficult to analyze, it is possible to conclude that security of the function may be increased if two layers are reserved for l(*)=4, and l(*)=3.

The Customization of the Hash Function

In one embodiment of the present invention, a paradigm for generating the hash functions by changing their inner structures is introduced. This procedure is referenced as customizing the hash function. There is a fundamental difference between the procedures of parameterization and customization of the hash function. Parameterization is the procedure of varying the security, the speed, or the memory consumption, etc. of the hashing algorithm, while customization is the procedure of generating (duplicating) the hash function with a different inner structure while keeping approximately the same level of security, speed, memory consumption, etc. In embodiments of the present invention varying methods of performing customization may be achieved.

Varying the Number of the Bit Strings

Consider an iterated masking procedure of degree l≧0 with splitting with jumping for direct and forward splitting. Denote by r₁ and r₂ the numbers of the tables prepared for direct and forward splitting, respectively. Up to l+3 layers may exist of bit strings associated to each table (for either the direct or forward scheme of distribution) under the considered conditions. Indeed, l+1 layers are related to l+1 collections CUR^(l(*)), l(*)=0, . . . , l. One layer is related to the bit strings associated to the distribution procedure and another layer is associated with splitting with jumping.

Let lm₁ be a parameter (a bit sequence) of length r₁+r₂. Then, based on the scheme, according to which one changes the number of the bit strings associated to all r_(l)+r₂ tables (described above in the MAC Construction section), the structure of the hash function may be customized.

In general it may be possible to consider up to 2² ^(n) possibilities to choose the bit strings related to different indices of the tables.

Varying the Number of Layers of the Bit Strings

Consider now an iterated masking procedure of degree l>0. Denote by lm₂ the parameter (a bit sequence) of length l and let lm₂(i) be the i-th bit of lm₂, i=0, 1, . . . , l.

The customization procedure in this case may be realized in the following way. If lm₂ (0) is 0, the layer of the bit strings may not be created for CUR⁰. Otherwise, the corresponding layer may be reserved for all the tables. If lm₂(1) is 0 it is not necessary to reserve the layer of the bit strings for CUR*. Otherwise the layer may be created. This process continues for all degrees.

Assume now that the direct and backward splitting may be performed with iterated masking of degrees l₁ and l₂, respectively. The size of lm₂ will be at least l−1+l₂+l₂+2, as the procedure just described can be expanded on the backward process of the calculation as well.

Varying the Number of the Bit Strings and the Number of Layers of the Bit Strings

In one embodiment of the present invention, the inner structure of the function may be altered by changing both the bit strings and the number of the layers of the bit strings. In this case the size of the customizing parameter can be lm₁+lm₂.

The Schemes of Customizing the Hash Function

In one embodiment of the present invention schemes of the customization of the hash function may be applied. For example:

The Customizing Scheme A

A message M may be hashed with a certain customizing parameter lm, save parameter lm in a public registry and send a message M with appended hash value h to a receiver. A receiver hashes the obtained message M using the parameter lm from a public registry, compares the new hash value with the appended one.

It is possible to change a customizing parameter in a public registry either every time when a message is hashed, or with certain interval of time. A customizing parameter can be generated by a pseudo-random generator as a random sequence of bits o f the corresponding length.

The Customizing Scheme B

The customizing scheme B may be effective in a hardware realization of the hash function. In accordance with the scheme a number of customizing parameters are generated. These are then numerated and saved in a special directory of any PC. For instance, this scheme may be realized in LAN. Hashing a message M may involve choosing the corresponding customizing parameter by pointing out the number of the used customizing parameter and sending the number to a public registry. A receiver may hash the obtained message, choosing the customizing parameter from the index in a public directory.

Keeping in mind the hardware realization of the algorithm, it is possible to place the customizing parameters in a flash memory. Assuming that all the computers use hardware realization of the hash function, that is the corresponding boards, such as, for example, FPGA or ASIC, may be included in all the computers of LAN. In such an environment it is possible to prepare the same set of the customizing parameters for all the computers in the same order. In order to hash a message it is necessary to know solely the index of the customizing parameter, in accordance with which we customize the structure of the function. Switching from one index to another may be carried out from time to time in accordance with the security policy of LAN. Of course, all the customizing parameters may be protected by standard methods of protection of information in a flash memory of FPGA or ASIC. The preliminary placed a set of customizing parameters into flash memory of all the boards from time to time may be updated.

Secure Hashing without MAC Construction

A key for changing a structure of the hashing scheme may be utilized. Such an approach may offer a few advantages before MAC construction. Firstly, the size of a used key may not be related to the size of a hash value. It may be possible to use the key of larger (or smaller) size than the size of a hash value. Secondly it may not be necessary to use a key every time when a message is hashed in the application of MAC. Once the inner structure of the hashing scheme is changed, a key may no longer be necessary. The hash function with changed structure can be kept secret in such an embodiment.

This embodiment of the present invention, as a scheme may be effective in the case of hardware implementation of the algorithm.

A difference between MAC construction and the proposed scheme may be that in the case of a MAC construction a key may be utilized for “keying” a message, while in the embodiment of the present invention that applied hashing without MAC construction a key may be utilized for “keying” the structure of the hashing algorithm.

As the construction of the ERINDALE hash function disclosed herein can be complex it may be virtually computationally infeasible to determine or discover the inner (keyed) structure of the function based on even a large number of outputs.

The “ERINDALE-PLUS” Hash Function

In one embodiment of the present invention a construction of the polynomial based hash function may be applied. A main feature of the function, and a feature that differs this embodiment of the present invention from prior art and provides a benefit over prior art, consists in applying the splitting with jumping and the bit strings associated with the splitting and the iterated masking—along with a methodology of distributing the elements between the tables. The ERINDALE-PLUS is a customized and parameterized hash function that does not require a lot of memory.

Performing the splitting with jumping accelerates the speed of the algorithm, while considering the bit strings associated with the splitting with jumping and the iterated masking increases the security of the function as two new “time” dimensions are embedded into the construction of the function. There is one more very important new feature of the new function, namely the procedure of “filling” the tables. As the iterated masking of the degree greater than 0 is computed, the tables may be associated with the elements of CUR^(l)(*) of different degrees. In the construction presented in the prior art, all the tables were associated with the elements from CUR of the same degree.

The function of the present invention may be implemented in a form of hardware or software.

Without loss of generality, it is possible to apply the direct and forward splitting, though, in general, any number of splitting for a different n value can be contemplated. It may also be possible to apply splitting procedures for the same n value but with different jumping tables.

Let M be any sequence of bits. M may be preliminary padded and, on the other hand, it may be possible to chose the recursive consecutive padding I, II or III or non-recursive consecutive padding. In this case the padding procedure will take place after processing M and forming the tables and the bit strings.

Multiple methods for padding a message M may be applied in embodiments of the present invention.

Denote by n_(d) and n_(b) the degrees of the polynomials for the direct and backward splitting, respectively. Let, further l_(d) and l_(b) be the degree of the iterated masking for the direct and backward splitting, correspondingly. Prepare, then two collections of tables Tb_(l) ^(d) and Tb_(j) ^(b) for processing the corresponding elements of the direct and backward splitting, respectively, and denote by Tb^(l) ^(d)(x), (Tb_(j) ^(b)(x)) the x-th entries of the corresponding tables for i=0, . . . , l_(d), j=0, . . . , l_(b). The tables Tb_(l) ^(d) will be related to the elements of CUR^(n) ^(d) of different degrees, i=0, . . . , l_(d), while tables Tb_(i) ^(n) ^(b) will be associated to the elements of CUR^(n) ^(b) of different degrees. If, for example, l_(d)=7 and l_(b)=15, table Tb₁ ^(d) will be related to the elements of CUR^(n*) ^(d) , while table Tb₃ ^(b) will be associated to the elements of CUR^(n***) ^(b) , and so forth.

To each table generally two layers of bit strings are prepared. One layer contains the bit strings related to splitting with jumping, and the second layer is linked to the bit strings associated with the iterated masking. Denote by Ls_(i) ^(d), Lm_(i) ^(d) the layers of the bit strings related to splitting with jumping and the iterated masking, correspondingly, that are linked to tables Tb_(l) ^(d), i=0, . . . , l_(d). By analogy, the layers Ls_(j) ^(b) and Lm_(j) ^(b) of the bit strings related to splitting with jumping and the iterated masking, respectively, are linked to tables Tb_(l) ^(b), i=0, . . . , l_(b).

If splitting without jumping is invoked the layers Ls_(i) ^(b), i=0, . . . , l_(d) and Ls_(j) ^(b), j=0, . . . , l_(b) may all be empty.

The process of updating the bit strings from Lm_(i) ^(d), Lm_(j) ^(b) i=0, . . . , l_(d), j=0, . . . , l_(b) was described earlier (see section “The bit strings related to the iterated masking”). Another scheme that may be applied is that of processing the tables and the bit strings without detailing. This is analogous to the direct splitting as involved in backward splitting.

The tables and the corresponding bit strings may be processed, for instance, for Tb₀ ^(d).

Firstly, all the entries of all the tables may be set to 0, and all the bits of all the bit strings have value 0.

Assume that to apply splitting with jumping layer Ls₀ ^(d) is not empty. Based on one of the schemes described in GROUP I and GROUP II subsections of the section “Multiple splitting with jumping”, it is possible to generate step-by-step a sequence q₁, . . . , q_(k) of integers for realizing the splitting with jumping, where k is a number of the elements of splitting.

In one embodiment of the present invention the calculation may commence by computing the elements of CUR^(d) of degree 0. Let CUR₁ ^(d) be the first element computed. It is then possible to increment by 1 the Tb₀ ^(d)(int(CUR₁ ^(d)))-th entry of table Tb₀ ^(d) and, having prepared mapping

ρ₀ ^(d): (0,1, . . . , 2^(n) ^(d) −1)→Y₀ ^(d),

to compute value

ρ₀ ^(d)(int(CUR₁ ^(d))).

Here Y₀ ^(d) is a collection of random non-zero positive integers.

Based on the obtained value we update the corresponding bit string from layer Lm₀ ^(d) as it was described earlier.

The bit strings may be updated from Ls₀ ^(d). In fact, the procedure of updating the bit strings related to splitting with jumping was described in section “Splitting with jumping and the bit strings”. A procedure of updating the bit string that was described in subsection “Scheme II” may be applied with a modified formula of calculating α.

Prepare a mapping

α₀ ^(d): {0, . . . , 2^(n) ^(d) −1}→Δ₀ ^(d),

where α₀ ^(d) is a set of non-zero integers, we compute

α₀ ^(d)(int(M₂⊕CUR₁ ^(d)))

and based on the value, update layer Ls₀ ^(d) in accordance with the procedure, described in the section “Splitting with jumping and the bit strings”, Scheme II.

It is possible to use M₂. It's not a problem as the generation of the elements of splitting, that is, elements M_(l), M₂, . . . , M_(k) takes much less time than calculation of the elements of masking, that is, CUR₁ ^(d), CUR₂ ^(d), . . . , CUR_(k) ^(d). Therefore it is possible to generate a block of elements of splitting for the time needed for calculation one element of the masking.

From now on, “update layer Lm₀ ^(d) (or Ls₀ ^(d))”, will mean “update the corresponding bit string from layer Lm₀ ^(d) (or Ls₀ ^(d))”.

Let CUR₂ ^(d) be the second element obtained in the process of computation. Again, it is possible to increment by 1 the Tb₀ ^(d)(int(CUR₂ ^(d)))-th entry of table Tb₀ ^(d) and after computing

ρ₀ ^(d)(int(CUR₂ ^(d))).

update layer Lm₀ ^(d). Then it is possible to calculate

α₀ ^(d)(int(M₃⊕CUR₂ ^(d)))

and update layer Ls₀ ^(d).

On the i-th step of the calculation for i≦k, having computed CURB it is possible to increment by 1 the Tb₀ ^(d)(int(CUR₁ ^(d)))-th entry of table Tb₀ ^(d) and update layer Lm₀ ^(d), based on

ρ₀ ^(d)(int(CUR₁ ^(d))).

Then it is possible to calculate

α₀ ^(d)(int(M_(i+1)⊕CUR_(i) ^(d)))

and update layer Lm₀ ^(d).

Let CUR_(k) ^(d) be the last element of processing a message M. It is possible to increment by 1 the Tb₀ ^(d)(int(CUR_(k) ^(d))-th entry of table Tb₀ ^(d) and update layer Lm₀ ^(d) after computing

ρ₀ ^(d)(int(CUR_(k) ^(d))).

At last it is possible to compute

α₀ ^(d)(int(M₁⊕CUR_(k) ^(d)))

and update layer Ls₀ ^(d).

Consider now, the iterated masking procedure of degree 1. Without loosing generality just the case of the direct splitting may be examined.

Having prepared table Tb₁ ^(d) and two layers Lm₁ ^(d) and Ls₁ ^(d) of the bit strings related to splitting with jumping and the iterated masking of degree 1, respectively, it is possible to generate a few elements of splitting and let CUR₁ ^(d*) be the first element of masking of degree 1. The Tb₁ ^(d)(int(CUR₁ ^(d*))-th entry of the

table may be incremented by 1 and the layer Lm₁ ^(d) may be updated after computing

ρ₁ ^(d)(int(CUR₁ ^(d*))).

for the prepared mapping

ρ₁ ^(d): {0, 1, . . . , 2^(n) ^(d) −1}→Y₁ ^(d).

In general, mapping ρ₁ ^(d) is different from ρ₁ ^(d). Then, having prepared mapping

ρ₁ ^(d): {0, 1, . . . , 2^(n) ^(d) −1}→Y₁ ^(d),

it is possible to calculate

α₁ ^(d)(int(M₃⊕CUR₁ ^(d*)))

and update layer Ls₁ ^(d).

On the i-th step of calculation for i≦k, obtaining CUR_(i) ^(d*) the Tb₁ ^(d)(int(CUR_(i) ^(d*)))-th entry of table Tb₁ ^(d) may be incremented by 1 and computing

ρ₁ ^(d)(int(M₃⊕CUR_(i) ^(d*)))

update layer Lm₁ ^(d).

Then it is possible to consider

α₁ ^(d)(int(M_(i+2)⊕CUR_(i) ^(d*)))

and update layer Ls₁ ^(d).

To finish the description of the scheme it is possible to estimate the last two steps of the processing, namely, k−l and k.

For CUR_(k−1) ^(d*) and CUR_(k) ^(d*) it is possible to increment two entries

Tb₁ ^(d)(int(CUR_(k−1) ^(d*)))

and

Tb₁ ^(d)(int(CUR_(k−1) ^(d*)))

of table Tb₁ ^(d) and after computing

ρ₁ ^(d)(int(CUR_(k−1) ^(d*)))

and

ρ₁ ^(d)(int(CUR_(k) ^(d*)))

correspondingly, and update two times layer Lm₁ ^(d).

Finally, after calculating

α₁ ^(d)(int(M_(k+1)⊕CUR_(k−1) ^(d*)))

and

α₁ ^(d)(int(M_(k+2)⊕CUR_(k) ^(d*)))

It is possible to two times update layer Ls₁ ^(d).

By analogy, the iterated masking procedure of degree l(*) and the calculation of the elements of CUR^(d) ^(l(*)) may be utilized to increment the corresponding entries of table Tb_(l(*)) ^(d) and, based on mapping

ρ_(l(*)) ^(d): {0, 1, . . . , 2^(n) ^(d) −1}→Y_(l(*)) ^(d),

update layer Lm_(l(*)) ^(d) step-by-step.

Keeping in mind the procedure of updating layer Ls_(l(*)) ^(d), it is possible to map

α_(l(*)) ^(d): {0, . . . , 2^(n) ^(d) −1}→Δ_(l(*)) ^(d),

and then, update layer Ls_(l(*)) ^(d) _(a)) based on the following sequence of integers

α_(l(*)) ^(d)(int(M_(i+1)⊕CUR_(i) ^(d) ^(l(*)) )),

for i=1, . . . k−l(*)−1. Then it is possible to calculate l(*)+1 remaining elements in accordance with

α_(l(*)) ^(d)(int(M_(i+1)⊕CUR_(k−l(*)+i) ^(d) ^(l(*)) ))

where i=0, . . . , l(*) and perform the last l(*)+1 steps of updating Ls_(l(*)) ^(d). Similarly, all the tables and the two layers of bit strings for the backward splitting may be processed.

Now processing of already prepared tables and the bit strings may then proceed. It may be assumed that the padding procedure has been previously applied.

Assuming that splitting with jumping is available it is possible to start processing layers Ls_(i) ^(d) and Ls_(j) ^(b), i=0, . . . , l_(d), j=0, . . . , l_(b).

It is possible to calculate

${{BSJ}^{d}(i)} = {\sum\limits_{x \in \Xi_{i}}{\left( {x + 1} \right){{int}\left( ɛ_{ix}^{d} \right)}}}$ and ${{BSJ}^{b}(j)} = {\sum\limits_{y \in \Xi_{j}}{\left( {y + 1} \right){{int}\left( ɛ_{jy}^{b} \right)}}}$

for i=0, . . . , l_(d) and j=0, . . . , l_(b). Here ε_(ix) ^(b) and ε_(jy) ^(b) are the bit strings for the corresponding i, j, x and y that were obtained after completing the direct and backward processes, correspondingly.

It is also possible to compute

${{BST}^{\; d}(i)} = {\sum\limits_{x \in W_{i}^{d}}{\left( {x + 1} \right){{int}\left( v_{ix}^{d} \right)}}}$ and ${{BST}^{\; b}(j)} = {\sum\limits_{x \in W_{j}^{b}}{\left( {x + 1} \right){{int}\left( v_{jx}^{b} \right)}}}$

for the bit strings from layers Lm_(i) ^(b) and Lm_(j) ^(b), respectively, i=0, . . . , l_(d) and j=0, . . . , l_(b).

Next applying the factorization procedure to tables Tb_(i) ^(d) and Tb_(j) ^(b), let J(n) be the lexicographically ordered set of all irreducible polynomials of degree less than n with the coefficients from F₂ and denote by irr(n) the cardinality of J(n). Thus, J(4) is the following ordered set:

{0, 1, x, x+1, x²+x+1, x³+x+1 , x³+x²+1}.

Denote by FC_(n)(h, i) the multiplicity of the i-th irreducible polynomial in the factorization of h ∈ F₂ ^(n). For instance, the result may be

FC ₄(x ² +x, 1)=0, FC ₄(x ² +x, 4)=1, FC ₄(x ³ +x ², 3)=2.

For each table Tb_(i) ^(d) and Tb_(j) ^(d) prepare one more table Tbf_(i) ^(d) and Tbf_(j) ^(b), i=0, . . . , l_(d), and j=0, . . . , l_(b). Any table Tbf_(i) ^(d) contains irr(n_(d)) entries, while any table Tbf_(j) ^(b contains irr(n) _(b)) entries, i=0, . . . , l_(d), j=0, . . . , l_(b).

For instance, if n_(d)=4 and n_(b)=5 then irr(4)=7 and irr(5)=10. Therefore any table Tbf_(i) ^(d) and Tbf_(j) ^(b) for i=0, . . . , l_(d) and j=0, . . . , l_(b) contains 7 and 10 entries, correspondingly.

Before processing the factorization procedure all the entries of the tables Tbf_(i) ^(d) and Tbf_(j) ^(b) are set to 0, i=0, . . . , l_(d) and j=0, . . . , l_(b).

Then calculate the values of the entries of the new tables in accordance with

Tbf _(i) ^(d)(t)=Σ_(j=1) ² ^(n) ^(d) Tb _(i) ^(d)(j)*FC _(n) _(d) (pol(j−1), t)  (29)

t=1, . . . , irr(n_(d)), i=0, . . . , l_(d). Here pol(j−1), j=1, . . . , 2^(n) ^(d) is a polynomial presentation (with coefficients from F₂) of the corresponding integers written in a binary form. For example, pol(3)=x+1, pol(9)=x³+1 and so forth. Moreover, Tb_(i) ^(d)(j) and Tbf_(i) ^(d)(t) are the values of the j-th and t-th entries of tables, Tb_(i) ^(d) and Tbf_(i) ^(d), correspondingly, i=0, . . . , l_(d).

By analogy

$\begin{matrix} {{{{Tbf}_{i}^{d}(t)} = {\sum\limits_{j = 1}^{2^{n_{d}}}{{{Tb}_{i}^{d}(j)}*{{FC}_{n_{d}}\left( {{{pol}\left( {j - 1} \right)},t} \right)}}}}{{t = 1},\ldots \mspace{14mu},{{irr}\left( n_{b} \right)},{i = 0},\ldots \mspace{14mu},{l_{b}.}}} & (30) \end{matrix}$

After computing the entries of the tables Tbf_(i) ^(d) and Tbf_(j) ^(b) it may be possible to enumerate the entries in accordance with the known procedures described in the prior art.

Thus, obtaining integers E_(i) ^(d) and E_(j) ^(b), i=0, . . . , l_(d), j=0, . . . , l_(b). Eventually it is possible to compute V^(d) and V^(b) by

V ^(d) =E ₀ ^(d) +BST ₀ ^(d) +BSJ ₀ ^(d)+2(E ₁ ^(d) +BST ₁ ^(d) +BSJ ₁ ^(d))+ . . . ++(l _(d)+1)(E _(l) _(d) ^(d) +BST _(l) _(d) ^(d) +BSJ _(l) _(d) ^(d)).  (31)ps

and

V ^(b) =E ₀ ^(b) +BST ₀ ^(b) +BSJ ₀ ^(b)+2(E ₁ ^(b) +BST ₁ ^(b) +BSJ ₁ ^(b))+ . . . ++(l _(b)+1)(E _(l) _(d) ^(b) +BST _(l) _(d) ^(b) +BSJ _(l) _(d) ^(b)).  (32).

Finally it is possible to compute

V=n _(d) V ^(d) +n _(b) V ^(b),

based on which the final hash value may be calculated in accordance with the procedure of the prior art.

Padding Procedure and the Final Hash Value Calculation Procedure

One or more methods of computing the final hash value based on the processed bit strings and the tables may be applied in embodiments of the present invention, as may methods of padding.

In the present invention, it may be possible to let Tbf_(i) ^(d)(t) and Tbf_(j) ^(b)(z) be the entries of the tables obtained during the procedure of processing a message, where t=1, . . . , irr(n_(d)), z=1, . . . , irr(n_(b)) i=0, . . . , l_(d) and j=0, . . . , l_(b). Based on the values of the tables it may be possible to form a sequence of bits for padding.

Denote by bin(x) a binary presentation of an integer x.

It may be possible to generate a sequence of bits Pad_(b) that will be a padding message for backward processing

Pad_(d)=bin (Tbf ₀ ^(d)(1))∥ bin(Tbf ₀ ^(d)(2))∥ . . . ∥ bin(Tbf ₀ ^(d)(irr(n_(d))))∥ bin (Tbf ₁ ^(d)(1))∥ bin(Tbf ₁ ^(d)(2))∥ . . . ∥ bin(Tbf ₁ ^(d)(irr(n_(d))))∥

bin(Tbf_(l) _(d) ^(d)(1))∥ bin(Tbf_(l) _(d) ^(d)(2)∥ . . . ∥ bin(Tbf_(l) _(d) ^(d)(irr(n_(d)))).

Here ∥ is an operation of concatenation of binary strings.

Now it may be possible to generate a padding message Pad_(d) for the direct processing, for example, in accordance with

Pad_(d)=bin (Tbf ₀ ^(b)(1))∥ bin(Tbf ₁ ^(b)(1))∥ . . . ∥ bin(Tbf _(l) _(b) ^(b)(1))∥ bin (Tbf ₀ ^(b)(2))∥ bin(Tbf ₁ ^(b)(2))∥ . . . ∥ bin(Tbf _(l) _(b) ^(b)(2))∥

bin(Tbf₀ ^(b)(irr(n_(b))))∥ bin(Tbf₁ ^(b)(irr(n_(b))))∥ . . . ∥ bin (Tbf_(l) _(b) ^(b)(irr(n_(b)))).

In one embodiment of the present invention it may be possible to modify the procedures of forming bit sequences Pad_(d) and Pad_(b).

It may be possible to may apply a key or a part of a key to change the order of the entries from the tables. It may also be possible to use a customization parameter (or a part of it) for defining the order of the entries of the tables for forming Pad_(d) and Pad_(b).

After the padding messages are generated, they may be processed and after finishing the padding a consideration of the process of calculating the bit strings may be initiated.

A method of computing the final hash just for layers Ls_(i) ^(d) and i=0, . . . , l_(d), may be applied. Methods for computing the final hash for other layers may incorporate similar or analogous procedures.

In general for software and hardware implementations it may be more convenient to set the lengths of the bit strings divisible by 8. In one embodiment of the present invention it may be assumed that the lengths of all the bit strings are divisible by 8.

It may be possible to denote by sub_(1x) ⁸ (ε_(ix) ^(d)) the sequence of bits containing the first 8 bits of bit string ε_(ix) ^(d), then by sub_(2x) ⁸ (ε_(ix) ^(d)) the second 8 bits of bit string ε_(ix) ^(d), x ∈ Ξ_(i) and so forth. So for any fixed i and x ∈ Ξ_(i) we have

ε_(ix) ^(d)=sub_(ix) ⁸(ε_(ix) ^(d))∥ sub_(2x) ⁸(ε_(ix) ^(d))∥ . . . ∥ sub_(ix) ⁸(ε_(ix) ^(d)),

where τ_(i)*8=len(ε_(ix) ^(d)), len(ε_(ix) ^(d)) is the length of ε_(ix) ^(d).

It may be possible to also assume that the lengths of all (ε_(ix) ^(d)) for x E ∈ Ξ_(i) within considered layer i are equal. It may then be possible to compute

val _(jx) ^(d)=(int(sub_(jx) ⁸(ε_(ix) ^(d)))*x)mod 256,

j=1, . . . , t_(i), i=0, . . . , l_(d), x ∈ Ξ_(i).

It may also be possible to compute val in accordance with

val _(jx) ^(i)=(int(sub_(jx) ⁸(ε_(ix) ^(d)))+x)mod 256,

j=1, . . . , t_(i), i=0, . . . , l_(d), x ∈ Ξ_(i). Any operation that involves int(sub_(jx) ⁸(ε_(ix) ^(d))) and x by mod 256 may be considered here.

Next it may be possible to calculate

h_(i1)=g_(x) ₁ ^((val) ^(1x) ₁ ^((x) ¹ ⁾⊕g_(x) ₂ ^((val) ^(1x) ₂ ^((x) ² ⁾⊕ . . . ⊕g_(x) ^(d) _(i) ^((val) ^(1x) _(i) ^((x) ² _(d) ^(i)) ,

then

h_(i2)=g_(x) ₁ ^((val) ^(2x) ₁ ^((x) ¹ ⁾⊕g_(x) ₂ ^((val) ^(2x) ₂ ^((x) ² ⁾⊕ . . . ⊕g_(x) ^(d) _(i) ^((val) ^(1x) _(i) ^((x) ² _(d) ^(i)) ,

h_(it) _(i) =g_(x) ₁ ^((val) ^(t) _(x) ¹ ^((x) ¹ ⁾⊕g_(x) ₂ ^((val) ^(t) _(x) ² ^((x) ² ⁾⊕ . . . ⊕g_(x) _(d) _(i) ^((val) ^(t) _(i) ^(x) _(d) ^(i) ^((x) ^(d) _(i)) ,

where Ξ_(i)={x₁, . . . , x_(d) _(t) }, and g_(x) ₁ , g_(x) ₂ , . . . , g_(x) _(d) _(i) are different generators of GF(2⁸), i=0, . . . , l_(d) and ⊕ is an operation of addition in GF(2⁸).

Consider now the situation when the lengths of all bit strings for all layers Ls_(i) ^(d), i=0, . . . , l_(d) are equal to t*8 for some t>0. Assume again that the lengths of all the bit strings within all Ls_(i) ^(d), i=0, . . . , l_(d) are equal.

It may be possible to compute

sh₁=f₁ ^(int(h) ¹¹ ⁾⊕f₂ ^(int(h) ²¹ ⁾⊕ . . . ⊕f_(l) _(d) ^(int(h) ^(l) _(d) ¹⁾,

sh₂=f₁ ^(int(h) ¹² ⁾⊕f₂ ^(int(h) ²² ⁾⊕ . . . ⊕f_(l) _(d) ^(int(h) ^(l) _(d) ²⁾,

sh_(t)=f₁ ^(int(h) ^(1t) ⁾⊕f₂ ^(int(h) ^(2t) ⁾⊕ . . . ⊕f_(l) _(d) ^(int(h) ^(l) _(d) ^(t)),

where f₁, . . . , f_(l) _(d) are different generators of GF(2⁸).

By analogy it may be possible to compute values mh₁, . . . , mh_(p) for layers Lm_(i) ^(d), where p*8 is the length of all the bit strings from Lm_(i) ^(d), i=0, . . . , l_(d). In general p and t are different.

The same calculations may be provided for backward layers Ls_(j) ^(b) and Lm_(j) ^(b), j=0, . . . , l_(b) and as the result of the calculations it may be possible to obtain collections of elements from GF(2⁸)

bsh₁, bsh₂, . . . , bsh_(bt) and bmh₁, bmh₂, . . . , bmh_(bp),

where bt*8 and bp*8 are the lengths of the corresponding bit strings. It is possible that p, t, bp and bt may be all different.

A procedure may be applied to generate q elements from GF(2⁸) (or from any other finite field GF(2^(n))) based on two collections of elements from GF(2⁸) (or from any other finite field GF(2^(n)))

a₁, a₂, . . . , a_(n) and b₁, b₂, . . . , b_(m)

for different n, m>0 such that n>q and m>q, but n<2q and m<2q.

Present collection a₁, a₂, . . . , a_(n) as a₁, a₂, . . . , a_(q), c₁, . . . , c₅, where

c₁=a_(q+1), c₂=a_(q+2), . . . , c_(s)=a_(n).

In a similar way present collection b₁, b₂, . . . , b_(m) as d₁, d₂, . . . , d_(l), b_(m−q+1), . . . , b_(m), where

d₁=b₁, d₂=b₂, . . . , d_(l)=b_(l).

There may be exactly q elements in collection b_(m−q+1), . . . , b_(m) and s<q, l<q.

It may be possible to compute

ti e₁=g^((int(a) ¹ ^(⊕d) ^(l) ⁾ ti e₂=g^((int(a) ² ^(⊕d) ^(l−1) ⁾⊕e₁, ti e₃=g^((int(a) ³ ^(⊕d) ^(l−2) ⁾⊕e₂, ti e_(l)=g^((int(a) ^(l) ^(⊕d) ¹ ⁾⊕e_(l−1), ti e_(l+1)=g^((int(a) ^(l+1) ⁾⊕e_(l), ti e_(q)=g^((int(a) ^(q) ⁾⊕e_(q−1), where g is a generator of GF(2⁸) (or from any other finite field GF (2^(n))).

It may be possible to calculate

h₁=f^((b) ^(m) ^(⊕c) ¹ ⁾,

h₂=f^((b) ^(m−1) ^(⊕c) ² ⁾⊕h₁,

h₃=f^((b) ^(m−2) ^(⊕c) ³ ⁾⊕h₂,

h_(s)=f^((b) ^(m−s) ^(⊕c) ^(s) ⁾⊕h_(s−1),

h_(s+1)=f^((b) ^(m−s−1) ⁾⊕h_(s),

h_(q)=f^((b) ^(m−q+1) ⁾⊕h_(q−1).

Here f is a generator of GF(2⁸) (or from any other finite field GF(2^(n)) which is different from g.

As another step it may be possible to calculate the desired q elements

e₁⊕h₁e₁⊕h₁, . . . , e_(q)⊕h_(q).

The procedure will be referenced as the iterated q-generation procedure.

It is possible that s can be equal to 0, or l can be equal to 0. In the iterated q-generation procedure it is possible not to use the elements c₁, . . . , c_(s), or d₁, d₂, . . . , d_(l), respectively.

Having the iterated q-generation procedure, it may be possible to remove the assumptions referenced previously, namely that the bit strings have the same length in a framework of one layer and even in a framework of all layers Ls and Lm.

Indeed, it may be enough to find the bit string with the minimal length l_(min) inside of each layer and start applying step by step the iterated l_(min)-generation procedure with all the bit strings starting from the first two. After obtaining one sequence of the corresponding elements of GF (2⁸) in every layer, it may be possible to find the sequence containing the minimal number of the elements, which we denote by f_(min), and again starting from the first two layers step by step apply the iterated f_(min)-generation procedure. In the result of the processing it may be possible to obtain a sequence of the corresponding elements from GF(2⁸) containing f_(min) elements.

There may be four collections of the elements from GF(2⁸) that may be obtained as the result of either applying the above described procedure or the corresponding iterated q-generation procedures. That is, it may be possible to have

sh₁, . . . , sh_(t), mh₁, . . . , mh_(p)

and

bsh₁, bsh₂, . . . , bsh_(bt), bmh₁, bmh₂, . . . , bmh_(bp).

Denote n₁=min {t, bp} and n₂=min{p, bt}. Assume that 2n₁>t, 2n₁>bp, 2n₂>p and 2n₂>bt.

It may be possible to apply the procedure of the iterated n₁-generation to collections sh₁, . . . , sh_(t) and bmh₁, bmh₂, . . . , bmh_(bp). As the result it may be possible to obtain a collection of elements from GF(2⁸) containing n₁ elements. The procedure of the iterated n₂-generation may then be applied to collections mh₁, . . . , mh_(p) and bsh₁, bsh₂, . . . , bsh_(bt). The result may be the corresponding collection of n₂ elements from GF(2⁸). Denote the collections by F_(i), i=1, . . . , n₁ and V_(j), j=1, . . . , n₂.

Let τ be a size of a hash value that needs to be generated. It may be possible to set from the beginning the lengths of the bit strings in such a way that 2τ>n₁, 2τ>n₂. Eventually the iterated τ-generation procedure may be applied to the collections F_(i), i=1, . . . , n₁ and V_(j), j=1, . . . , n₂ and get the final hash value h_(τ)may be derived.

It may not be necessarily always to present the bit strings as the collection of elements of GF(2⁸). For instance it may be possible to use GF(2⁴), or even GF(2²). If the length of a bit string is divisible by a, it may be possible to use GF(2^(a)).

In one embodiment of the present invention, the number of tables prepared for both direct and backward splitting may be different. For example, it may be possible to prepare just one table for direct and one table for backward processes. One or more tables may be generated just for the direct (backward) procedure. In this case, based on the tables, the corresponding padding message may be prepared just for backward (direct) processing, while a padding message for direct (backward) processing may be prepared in accordance with recursive or non-recursive consecutive padding procedure.

In one embodiment of the present invention it may be possible to reserve up to l_(d)+1 layers Lm^(d) and up to l_(d)+1 layers Ls^(d) of the bit strings for the table associated to the direct processing. By analogy, up to l_(b)+1 layers Lm^(b) and up to l_(b)+1 layers Ls^(b) of the bit strings may be reserved for the table associated to the backward processing. It is also possible to increment the corresponding entries of both tables based on the elements of CUR_(a) ^(d) (and CUR_(c) ^(b)). where a≦l_(d) (and b≦l_(b)).

On the other hand, the list of the bit strings within the layers related to jumping and the list of the bit strings within the layers related to the iterated masking for both tables can be used as the parameter of customization. For example, let l_(d)=37 and l_(b)=42. In this case it is possible to use a parameter (a bit sequence) of size 76+86=160 as a customization parameter. Indeed, the first 76 bits of the customizing bit sequence are linked to the first table, that is, to the direct splitting. Specifically, the first 38 bits define the list of the bit strings of the layers related to splitting with jumping, while the next 38 bits customize the list of the bit strings within the layers related to the iterated masking. The customization procedure for the table associated to the direct splitting may be defined as follows. If, the i-th bit of the customization parameter is 0, it is not necessary to create the layer related to jumping for CUR^(d) of degree i−1, if i=1, . . . , l_(d)+1, otherwise it is possible to embed the corresponding bit string associated to CUR^(d) of the iterated degree i−1. Then if the i-th bit of the parameter is 0 for i=l_(d)+2, . . . , 2l_(d)+2 it is not necessary to create the bit strings within the layer related to the iterated masking for CUR^(d) of degree i−l_(d)−2, otherwise the corresponding bit strings will be built.

The same consideration may be applied to the remaining bits of the parameter. For example, it is possible to just work with the corresponding layers for the table associated to the backward splitting.

Finally, the number of the tables may be greater than two and less than l_(d)+l_(b)+2.

In this case many possibilities may be available to distribute the layers Lm_(i) ^(d) and Ls_(i) ^(d), i=0, . . . , l_(d) between the tables associated to the direct splitting.

By analogy, it may be possible to distribute layers Lm_(j) ^(b) and Ls_(j) ^(b), j=0, . . . , l_(b) between the tables associated with the backward splitting in different ways as well.

The ERINDALE-PLUS algorithm may provide a means for realizing secure hashing without MAC construction. The example of customizing the function disclosed above may be transferred to the building the scheme of secure hashing. Generally, various parameters of the function may be keyed, such as, for example: a collection of indices, for which the bit strings are generated; the lengths of the bit strings; the order of the entries of the tables during the procedure of forming Pad_(d) and Pad_(b); and the order of processing the bit strings in the situation when the iterated q-generation procedure is applied.

The Digital Signature Algorithms Based on a Customized Hash Function

A digital signature is a method of authenticating any digital information. As an output of an applied digital signatures algorithm may be one or more binary strings that provide authenticity, integrity and non-repudiation of the transmitted message.

Known digital signature algorithms are generally based on a public key cryptography and consist of two parts—a signing algorithm and a verification algorithm. Known digital signature algorithms usually provide a hash (or MAC) value of a file.

In one embodiment of the present invention an ERINDALE-PLUS hash function is applied. This involves a digital signature algorithm capable of calculating the hash value in accordance with a chosen customized parameter. In other words, before generating a digital signature for a file it is necessary to hash the file with a certain customization parameter. After generating the digital signature a receiver should be alerted that a certain customization parameter was used to compute a hash value, based on which the digital signature was calculated.

In another embodiment of the present invention, a customization parameter may be stored in a public directory. This storage of the customization parameter in a public directory may occur when a sender hashes a file. At this point the user applies the customization parameter from the directory for setting the corresponding inner structure of the hashing algorithm. Then a sender using a private key, the generated hash value, and information from a public directory may compute a digital signature. Thus after obtaining the file with the attached signature, a receiver may hash the file using the customization parameter from a public directory and then accept or reject the message based on the result of the verification algorithm.

Embodiments of the invention may be represented as a software product stored in a machine readable medium (also referred to as a computer-readable medium, a processor-readable medium, or a computer usable medium having a computer readable program code embodied therein). The machine readable medium may be any suitable tangible medium, including magnetic, optical, or electrical storage medium including a diskette, compact disk read only memory (CD-ROM), memory device (volatile or non-volatile), or similar storage mechanism. The machine-readable medium may contain various sets of instructions, code sequences, configuration information, or other data, which, when executed, cause a processor to perform steps in a method according to an embodiment of the invention. Those of ordinary skill in the art will appreciate that other instructions and operations necessary to implement the described invention may also be stored on the machine-readable medium. Software running from the machine readable medium may interface with circuitry to perform the described tasks.

As one example, the method of the present invention can be readily implemented in a Dynamically Linked Library or DLL which is linked to a computer program that utilizes an algorithm that embodies the hash function, MAC function or ERINDALE-PLUS function described above, for example, an encryption, decryption or authentication utility that is operable to apply said algorithm.

The computer program of the present invention is therefore best understood as a computer program that includes computer instructions operable to implement an operation consisting of the calculation of the hash value or MAC value as described above.

Another aspect of the present invention is a computer system that is linked to a computer program that is operable to implement on the computer system the transformation of a MAC-value, in accordance with the present invention.

This invention will be of use in any environment where hash functions, MAC functions and ERINDALE functions may be used for data integrity or authentication (digital signatures being an example).

An example is secure email. Several widely used systems for secure email (such as PGP and S/MIME) use SHA-1 as the hash algorithm.

As another example, the method of the present invention can be readily implemented in a specially constructed hardware device. Such a hardware implementation of the present invention may enable a dramatic increase in the speed of hashing, as all the hardware implementations of stream algorithms are usually much faster than the corresponding software implementations. In particular, one embodiment may apply one-chip hardware configuration.

The aspects of the present invention and embodiments thereof presented lend the invention to several applications. For example, the present invention may be applied to an online environment wherein digital signatures are routinely applied, for the purpose of ensuring the security of data passed between users. This use has practical applicability in several markets regarding the flow of electronic information, such as banking, legal, other professional businesses and trades, as well as within the public sector in government, universities, hospitals and other institutions. In these environments information is passed regularly between members by way of the Internet, Intranets and internal networks. Furthermore, as the speed of the hash function may be significantly increased when the invention is implemented by way of hardware, in such an implementation it may be possible to apply the invention to the flow of confidential information by way of methods requiring fast processing, such as video-conferencing. For example, organizations such as the military require secure and fast means of telecommunication to permit the passing of confidential information between members located distant from one another. The speed of the hash function can be very high in hardware implementations, for example, up to 3.4 giga-bits/second (FPGA V, ˜400 MHz), therefore, such an implementation may provide a utile means of supporting private video-conferencing and protecting the confidential of nature of information passed therein. Furthermore, online implementations of the present invention can utilize existing signal processing providers, such as telecommunications companies like as Bell Canada™ or Rogers™, as well as private networks, to facilitate transmissions.

The above-described embodiments of the present invention are intended to be examples only. Alterations, modifications and variations may be effected to the particular embodiments by those of skill in the art without departing from the scope of the invention, which is defined solely by the claims appended hereto.

It will be appreciated by those skilled in the art that other variations of the embodiments described herein may also be practiced without departing from the scope of the invention. Other modifications are therefore possible. 

1) A system directed at hash functions capable of averting attacks upon messages characterized in that it comprises: a) at least one computer; b) a message sent by a sender by way of the at least one computer; c) one or more polynomial-based hashing functions being operable by the at least one computer for application to the message to produce a hash output, utilizing one or more of the following elements: i) a splitting with jumping function; ii) a masking function; iii) a bit string generation function; and iv) a padding function; d) one or more processing functions operable to generate an output that averts attacks upon the message; and wherein attacks upon the security of the message are averted through the application of the one or more polynomial-based hash functions and the one or more processing functions to the message. 2) The system of claim 1, characterized in that it comprises implementation by way of either hardware or software. 3) The system of claim 1, characterized in that the one or more polynomial-based hash functions incorporate an ERINDALE-PLUS hashing algorithm. 4) The system of claim 1, characterized in that the hash output is one or more bit strings. 5) The system of claim 4, characterized in that the one or more processing functions are operable to organize the one or more bit strings into a sum. 6) The system of claim 4, characterized in that the one or more bit strings are multi-layered. 7) The system of claim 6, characterized in that the one or more bit strings incorporate three or more layers. 8) The system of claim 4, characterized in that the one or more polynomial-based hash functions may incorporate requirements relating to the size of bit strings. 9) The system of claim 1, characterized in that the masking function involves iterated equations over finite fields. 10) A method of application of a polynomial-based hash function to a message sent by a user from a computer, characterized in that it comprises the following steps: a) calculating a hash output utilizing the polynomial-based hash function by one or more of the following steps: i) applying a splitting with jumping function to the message to generate splitting with jumping outputs; ii) applying a masking function to the splitting with jumping outputs to generate masking outputs; iii) applying a bit string generation function to the masking outputs to generate bit strings outputs; and iv) applying a padding function to the bit strings outputs to generate padding outputs; b) processing the padding outputs by one or more processing functions operable to generate a set of polynomials; c) performing the incorporation of the set of polynomials with the message to generate an output that averts attacks upon the security of the message. 11) The method of claim 10, characterized in that it comprises the further steps of implementing one or more of the following steps by way of either hardware or software: a) calculating the hash output; b) processing the message; and c) performing the incorporation. 12) The method of claim 10, characterized in that it comprises the further step of incorporate an ERINDALE-PLUS hashing algorithm to calculate the hash output. 13) The method of claim 10, characterized in that it comprises the further step of generating one or more bit strings as the hash output. 14) The method of claim 13, characterized in that it comprises the further step of utilizing the one or more processing functions to organize the one or more bit strings into a sum. 15) The method of claim 13, characterized in that it comprises the further step of incorporating requirements relating to the size of bit strings. 16) The method of claim 10, characterized in that it comprises the further step of applying the masking function to involve iterated equations over finite fields. 17) The method of claim 10 characterized in that it comprises the further step of implementing the one or more polynomial-based hash functions by way of a computer program including computer instructions operable to implement an operation consisting of the calculation of the hash output. 18) The method of claim 10 characterized in that it comprises the further step of implementing one or more of the following steps by way of a computer program including computer instructions to achieve: a) processing the message by one or more processing functions operable to process the hash output to generate a set of polynomials; and b) performing the incorporation of the set of polynomials with the message to avert attacks upon the security of the message. 19) The method of claim 10 characterized in that it comprises the further step of generating bit strings outputs that are one or more of the following: a) one or more bit stings; or b) one or more tables. 20) A computer system characterized in that it comprises software to program existing computer hardware to: a) receive a message sent by a sender; b) apply one or more polynomial-based hashing functions to the message to produce a hash output, utilizing one or more of the following elements: i) a splitting with jumping function; ii) a masking function; iii) a bit string generation function; and iv) a padding function; c) process the hash output by one or more processing functions operable to generate an output that averts attacks upon the security of the message. 21) A polynomial-based hash function operable by way of a computer program including computer instructions operable to averting attacks upon a message sent by a sender characterized in that it comprises: a) one or more of the following elements to produce a hash output, each facilitating a parameterized inner structure: i) a splitting with jumping function; ii) a masking function; iii) a bit string generation function; and iv) a padding function; b) one or more processing functions operable to generate an output that averts attacks upon the security of the message. 