Abstract
This work describes the application of a new version of the Secure Hash Algorithm SHA-3 that was recently chosen as standard, in order to improve the performance of certificate revocation in Vehicular Ad-hoc NETworks (VANETs), which are interesting self-organizing networks. Specifically, we propose the use of both a duplex construction instead of the sponge one present in the SHA-3 version of the Keccak hash function, and a dynamic authenticated data structure based on B-trees, which allows taking advantage of such a construction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Andreeva, E., Mennink, B., Preneel, B.: Security reductions of the second round SHA-3 candidates. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 39–53. Springer, Heidelberg (2011)
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document (2009), http://keccak.noekeon.org/Keccak-main-2.1.pdf
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications, Submission to NIST, Round 2 (2010), http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/documents/papers/DAEMEN_DuplexSponge.pdf
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission, Submission to NIST, Round 3 (2011), http://keccak.noekeon.org/Keccak-submission-3.pdf
Chang, S., Perlner, R., Burr, W., Turan, M., Kelsey, J., Paul, S., Bassham, L.: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition, NIST (2012), http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7896.pdf
Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: Toward Revocation Data Handling Efficiency in VANETs. In: Vinel, A., Mehmood, R., Berbineau, M., Garcia, C.R., Huang, C.-M., Chilamkurti, N. (eds.) Nets4Cars/Nets4Trains 2012. LNCS, vol. 7266, pp. 80–90. Springer, Heidelberg (2012)
Homsirikamol, E., Rogawski, M., Gaj, K.: Comparing Hardware Performance of Fourteen Round two SHA-3 Candidates using FPGAs, Cryptology ePrint Archive, Report 2010/445, 210 (2010), http://eprint.iacr.org/2010/445 (January 15, 2011)
Jakobsson, M., Wetzel, S.: Efficient attribute authentication with applications to ad hoc networks. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 38–46 (2004)
Knuth, D.: Sorting and Searching, The Art of Computer Programming, 2nd edn., vol. 3, pp. 476–477, pp. 481–491. Addison-Wesley (1998)
Martin, F., Caballero, P.: Analysis of the New Standard Hash Function SHA-3. In: Fourteenth International Conference On Computer Aided Systems Theory, Las Palmas de Gran Canaria Spain (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Martín-Fernández, F., Caballero-Gil, P. (2013). Version of the New SHA Standard Applied to Manage Certificate Revocation in VANETs. In: Rojas, I., Joya, G., Gabestany, J. (eds) Advances in Computational Intelligence. IWANN 2013. Lecture Notes in Computer Science, vol 7902. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38679-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-38679-4_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38678-7
Online ISBN: 978-3-642-38679-4
eBook Packages: Computer ScienceComputer Science (R0)