Design of Random Oracle For Block Iterated one-Way Ciphers Through Polynomial Functions
P. Karthik1, P. Shanthibala2
1P. Karthik, Research Scholar, Department of Computer Science, School of Engineering and Technology, Pondicherry University, Puducherry (Tamil Nadu), India.
2Dr. P. Shanthibala, Assistant Professor, Department of Computer Science, School of Engineering and Technology, Pondicherry University, Puducherry (Tamil Nadu), India.
Manuscript received on 18 August 2019 | Revised Manuscript received on 29 August 2019 | Manuscript Published on 06 September 2019 | PP: 1027-1034 | Volume-8 Issue- 6S, August 2019 | Retrieval Number: F11960886S19/19©BEIESP | DOI: 10.35940/ijeat.F1196.0886S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The security aspect on provably secure hash function relies upon the design principles of Random Oracle (RO). Poor design principles make the said function vulnerable to hash attacks. The conventional keyless provably secure hash functions MD-5, SHA-2 and SHA-3 use RO or Sponge principles for the design and construction of hash function. They use bitwise operators AND, OR, XOR and modulo arithmetic for processing the input blocks. These operators are simple to use and they are efficient in terms of achieving quick response time. At the same time the repeated use of them in the input blocks may invite hash collisions. The proposed design advocates the use of multi variable higher-order polynomial function for the design of round function in RO. The new design paradigm derogates the use of bitwise operators at block level processing and hardens the internal structure of RO with higher- order polynomial function to ensure better security. The results prove that, the new prototype helps the block iterated hash function to exhibit strong random behavior even for a small bit flip in the input. Therefore, performing differential analysis on the proposed design is very hard than ever before.
Keywords: Block Iterated Hash Functions, Polynomials For Sparse Mapping of Hashes, Random Oracle Design Through Polynomials, Enhancing Hash Security Using Polynomials, Avalanche Effect in Hash Design Using Polynomials, Provably Secure Block Iterated Hash Functions.
Scope of the Article: Logic, Functional programming and Microcontrollers for IoT