AUTOMATIC DESIGN OF NONCRYPTOGRAPHIC HASH FUNCTIONS USING GENETIC PROGRAMMING

被引:13
作者
Estebanez, Cesar [1 ]
Saez, Yago [1 ]
Recio, Gustavo [1 ]
Isasi, Pedro [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
关键词
hash functions; genetic programming; evolutionary computation;
D O I
10.1111/coin.12033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Noncryptographic hash functions have an immense number of important practical applications owing to their powerful search properties. However, those properties critically depend on good designs: Inappropriately chosen hash functions are a very common source of performance losses. On the other hand, hash functions are difficult to design: They are extremely nonlinear and counterintuitive, and relationships between the variables are often intricate and obscure. In this work, we demonstrate the utility of genetic programming (GP) and avalanche effect to automatically generate noncryptographic hashes that can compete with state-of-the-art hash functions. We describe the design and implementation of our system, called GP-hash, and its fitness function, based on avalanche properties. Also, we experimentally identify good terminal and function sets and parameters for this task, providing interesting information for future research in this topic. Using GP-hash, we were able to generate two different families of noncryptographic hashes. These hashes are able to compete with a selection of the most important functions of the hashing literature, most of them widely used in the industry and created by world-class hashing experts with years of experience.
引用
收藏
页码:798 / 831
页数:34
相关论文
共 54 条
[1]  
Aherne FJ, 1998, KYBERNETIKA, V34, P363
[2]  
[Anonymous], 2001, Advances in Cryptology-CRYPTO'89 Proceedings
[3]  
[Anonymous], HASH FUNCTIONS
[4]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P401
[5]  
Berarducci P., 2004, P 15 MIDW ART INT CO, P31
[6]  
Bertoni G., 2007, ECRYPT EUR NETW EXC
[7]  
Bertoni G, 2008, LECT NOTES COMPUT SC, V4965, P181
[8]  
Biham E., 2006, 2 NIST CRYPT HASH WO, V2006, P2
[9]  
Cormen T., 2001, Introduction to Algorithms
[10]  
Crosby SA, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P29