Permutation-Based Hashing Beyond the Birthday Bound

被引:0
|
作者
Lefevre, Charlotte [1 ]
Mennink, Bart [1 ]
机构
[1] Radboud Univ Nijmegen, Digital Secur Grp, Nijmegen, Netherlands
关键词
double block length hashing; permutation-based hashing; sponge; lightweight cryptography; beyond birthday bound; AUTHENTICATED ENCRYPTION; SECURITY; INDIFFERENTIABILITY; COLLISION; FAMILY; KEY; DM;
D O I
10.46586/tosc.v2024.i1.71-113
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2(c/2) queries, where c is the capacity. In particular, it cannot provide generic security better than half of the underlying permutation size. In this paper, we aim to achieve hash function security beating this barrier. We present a hashing mode based on two b-bit permutations named the double sponge. The double sponge can be seen as the sponge embedded within the double block length hashing paradigm, making two permutation calls in parallel interleaved with an efficient mixing function. Similarly to the sponge, the permutation size is split as b = r + c, and the underlying compression function absorbs r bits at a time. We prove that the double sponge is indifferentiable from a random oracle up to around 2(2c/3) queries. This means that the double sponge achieves security beyond the birthday bound in the capacity. In addition, if c > 3b/4, the double sponge beats the birthday bound in the primitive size, to our knowledge being the first hashing mode based on a permutation that accomplices this feature. lightweight cryptography center dot beyond birthday bound
引用
收藏
页码:71 / 113
页数:43
相关论文
共 50 条
  • [1] Beyond-birthday security for permutation-based Feistel networks
    Guo, Chun
    Zhang, Guoyan
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (03) : 407 - 440
  • [2] Beyond-birthday security for permutation-based Feistel networks
    Chun Guo
    Guoyan Zhang
    Designs, Codes and Cryptography, 2021, 89 : 407 - 440
  • [3] Security/efficiency tradeoffs for permutation-based hashing
    Rogaway, Phillip
    Steinberger, John
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 220 - +
  • [4] Phasing: Private Set Intersection using Permutation-based Hashing
    Pinkas, Benny
    Schneider, Thomas
    Segev, Gil
    Zohner, Michael
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 515 - 530
  • [5] Permutation-Based Lightweight Authenticated Cipher with Beyond Conventional Security
    Zhang, Ping
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] Permutation-Based Lightweight Authenticated Cipher with beyond Conventional Security
    Zhang, Ping
    Security and Communication Networks, 2021, 2021
  • [7] Permutation-based distributed video coding
    Guo Lihua
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 85 - 89
  • [8] Quantized ranking for permutation-based indexing
    Mohamed, Hisham
    Marchand-Maillet, Stephane
    INFORMATION SYSTEMS, 2015, 52 : 163 - 175
  • [9] Boolean permutation-based key escrow
    Wu, Chuan-Kun
    Varadharajan, Vijay
    Computers and Electrical Engineering, 1999, 25 (04): : 291 - 304
  • [10] Boolean permutation-based key escrow
    Wu, CK
    Varadharajan, V
    COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (04) : 291 - 304