Hash channels

Chuan Kun Wu*

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    6 Citations (Scopus)

    Abstract

    It is believed that in authentication protocols where no random numbers are involved, it is hard to introduce subliminal channels. In this paper we show that subliminal channels exist in digital signature schemes where no random numbers are used. The source where the subliminal channels exist is widely acceptable hash functions with their outputs being of some randomness. Because the subliminal channels are established by using hash functions, the subliminal channels are called hash channels in this paper. This indicates that there exist subliminal channels in any authentication protocols that use hash functions.

    Original languageEnglish
    Pages (from-to)653-661
    Number of pages9
    JournalComputers and Security
    Volume24
    Issue number8
    DOIs
    Publication statusPublished - Nov 2005

    Fingerprint

    Dive into the research topics of 'Hash channels'. Together they form a unique fingerprint.

    Cite this