Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Groups Complexity Cryptology

Managing Editor: Shpilrain, Vladimir / Weil, Pascal

Editorial Board: Ciobanu, Laura / Conder, Marston / Dehornoy, Patrick / Eick, Bettina / Elder, Murray / Fine, Benjamin / Gilman, Robert / Grigoriev, Dima / Ko, Ki Hyoung / Kreuzer, Martin / Mikhalev, Alexander V. / Myasnikov, Alexei / Perret, Ludovic / Roman'kov, Vitalii / Rosenberger, Gerhard / Sapir, Mark / Thomas, Rick / Tsaban, Boaz / Capell, Enric Ventura

CiteScore 2017: 0.32

SCImago Journal Rank (SJR) 2017: 0.208
Source Normalized Impact per Paper (SNIP) 2017: 0.322

Mathematical Citation Quotient (MCQ) 2017: 0.32

See all formats and pricing
More options …

Compositions of linear functions and applications to hashing

Vladimir Shpilrain / Bianca Sosnovski
  • Corresponding author
  • Queensborough Community College and Graduate Center, City University of New York, United States of America
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
Published Online: 2016-10-14 | DOI: https://doi.org/10.1515/gcc-2016-0016


Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi)group. In this paper, we focus on hashing with linear functions of one variable over 𝔽p. The corresponding hash functions are very efficient. In particular, we show that hashing a bit string of length n with our method requires, in general, at most 2n multiplications in 𝔽p, but with particular pairs of linear functions that we suggest, one does not need to perform any multiplications at all. We also give explicit lower bounds on the length of collisions for hash functions corresponding to these particular pairs of linear functions over 𝔽p.

Keywords: Cayley hash functions; semigroups; linear functions

MSC 2010: 20M05; 94A60; 68P30


  • [1]

    Bromberg L., Shpilrain V. and Vdovina A., Navigating in the Cayley graph of SL2(𝔽p) and applications to hashing, preprint 2014 http://arxiv.org/abs/1409.4478; to appear in Semigroup Forum.

  • [2]

    Caldwell C., The primes pages, https://primes.utm.edu.

  • [3]

    Cassaigne J., Harju T. and Karhumäki J., On the undecidability of freeness of matrix semigroups, Internat. J. Algebra Comput. 9 (1999), 295–305. Google Scholar

  • [4]

    Contini S., Lenstra A. K. and Steinfeld R., VSH, an efficient and provable collision-resistant hash function, Advances in Cryptology – EUROCRYPT 2006, Lecture Notes in Comput. Sci. 4004, Springer, Berlin (2006), 165–182. Google Scholar

  • [5]

    Dai W., Crypto++ 5.6.0 benchmarks, http://www.cryptopp.com/benchmarks.html.

  • [6]

    Grassl M., Ilić I., Magliveras S. and Steinwandt R., Cryptanalysis of the Tillich–Zémor hash function, J. Cryptology 24 (2011), 148–156. Google Scholar

  • [7]

    Menezes A., van Oorschot P. and Vanstone S., Handbook of Applied Cryptography, CRC Press, Boca Raton, 1997. Google Scholar

  • [8]

    Mullan C. and Tsaban B., SL2 homomorphic hash functions: Worst case to average case reduction and short collision search, Des. Codes Cryptogr. 81 (2016), 83–107. Google Scholar

  • [9]

    Petit C., On graph-based cryptographic hash functions, PhD thesis, Université Catholique de Louvain, 2009. Google Scholar

  • [10]

    Petit C. and Quisquater J., Preimages for the Tillich–Zémor hash function, Selected Areas in Cryptography (SAC ’10), Lecture Notes in Comput. Sci. 6544, Springer, Berlin (2010), 282–301. Google Scholar

  • [11]

    Petit C. and Quisquater J.-J., Rubik’s for cryptographers, Notices Amer. Math. Soc. 60 (2013), 733–739. Google Scholar

  • [12]

    Rukhin A., Soto J., Nechvatal J., Smid M., Barker E., Leigh S., Levenson M., Vangel M., Banks D., Heckert A., Dray J. and S. Vo , A statistical test suite for random and pseudorandom number generators for cryptographic applications, SP 800-22 Rev. 1a, National Institute of Standards & Technology Gaithersburg, 2010. Google Scholar

  • [13]

    Tillich J.-P. and Zémor G., Group-theoretic hash functions, Proceedings of the First French–Israeli Workshop on Algebraic Coding, Lecture Notes in Comput. Sci. 781, Springer, Berlin (1993), 90–110. Google Scholar

  • [14]

    Tillich J.-P. and Zémor G., Hashing with SL2, Advances in cryptology – CRYPTO ’94, Lecture Notes in Comput. Sci. 839, Springer, Berlin (1994), 40–49. Google Scholar

  • [15]

    National Institute of Standards and Technology – NIST , NIST Statistical Test Suite, http://csrc.nist.gov/groups/ST/toolkit/rng/documentation\_software.html.

About the article

Received: 2016-05-08

Published Online: 2016-10-14

Published in Print: 2016-11-01

Funding Source: National Science Foundation

Award identifier / Grant number: CNS-1117675

Funding Source: Office of Naval Research

Award identifier / Grant number: N000141210758

Research of the first author was partially supported by the NSF grant CNS-1117675 and by the ONR (Office of Naval Research) grant N000141210758.

Citation Information: Groups Complexity Cryptology, Volume 8, Issue 2, Pages 155–161, ISSN (Online) 1869-6104, ISSN (Print) 1867-1144, DOI: https://doi.org/10.1515/gcc-2016-0016.

Export Citation

© 2016 by De Gruyter.Get Permission

Comments (0)

Please log in or register to comment.
Log in