Permutation-Based Hashing Beyond the Birthday Bound

被引:0
|
作者
Lefevre, Charlotte [1 ]
Mennink, Bart [1 ]
机构
[1] Radboud Univ Nijmegen, Digital Secur Grp, Nijmegen, Netherlands
关键词
double block length hashing; permutation-based hashing; sponge; lightweight cryptography; beyond birthday bound; AUTHENTICATED ENCRYPTION; SECURITY; INDIFFERENTIABILITY; COLLISION; FAMILY; KEY; DM;
D O I
10.46586/tosc.v2024.i1.71-113
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2(c/2) queries, where c is the capacity. In particular, it cannot provide generic security better than half of the underlying permutation size. In this paper, we aim to achieve hash function security beating this barrier. We present a hashing mode based on two b-bit permutations named the double sponge. The double sponge can be seen as the sponge embedded within the double block length hashing paradigm, making two permutation calls in parallel interleaved with an efficient mixing function. Similarly to the sponge, the permutation size is split as b = r + c, and the underlying compression function absorbs r bits at a time. We prove that the double sponge is indifferentiable from a random oracle up to around 2(2c/3) queries. This means that the double sponge achieves security beyond the birthday bound in the capacity. In addition, if c > 3b/4, the double sponge beats the birthday bound in the primitive size, to our knowledge being the first hashing mode based on a permutation that accomplices this feature. lightweight cryptography center dot beyond birthday bound
引用
收藏
页码:71 / 113
页数:43
相关论文
共 50 条
  • [41] Generalizing Beyond the Test: Permutation-Based Profile Analysis for Explaining DIF Using Item Features
    Bolsinova, Maria
    Tijmstra, Jesper
    Rutkowski, Leslie
    Rutkowski, David
    JOURNAL OF EDUCATIONAL AND BEHAVIORAL STATISTICS, 2024, 49 (02) : 207 - 240
  • [42] Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks
    Gao, Yuan
    Guo, Chun
    Wang, Meiqin
    Wang, Weijia
    Wen, Jiejing
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 305 - 326
  • [43] A Permutation-Based Changepoint Technique for Monitoring Effect Sizes
    Kent, Daniel
    Wilson, James D.
    Cranmer, Skyler J.
    POLITICAL ANALYSIS, 2022, 30 (02) : 167 - 178
  • [44] A novel bit permutation-based image encryption algorithm
    Saiyma Fatima Raza
    Vishal Satpute
    Nonlinear Dynamics, 2019, 95 : 859 - 873
  • [45] Aging Attacks for Key Extraction on Permutation-Based Obfuscation
    Guo, Zimu
    Tehranipoor, Mark M.
    Forte, Domenic
    PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), 2016,
  • [46] Pivot Selection Strategies for Permutation-Based Similarity Search
    Amato, Giuseppe
    Esuli, Andrea
    Falchi, Fabrizio
    SIMILARITY SEARCH AND APPLICATIONS (SISAP), 2013, 8199 : 91 - 102
  • [47] Permutation-based finite implicative fuzzy associative memories
    Valle, Marcos Eduardo
    INFORMATION SCIENCES, 2010, 180 (21) : 4136 - 4152
  • [48] A permutation-based Bayesian approach for inverse covariance estimation
    Cao, Xuan
    Zhang, Shaojun
    COMMUNICATIONS IN STATISTICS-THEORY AND METHODS, 2020, 49 (14) : 3557 - 3571
  • [49] Towards a Stronger Theory for Permutation-based Evolutionary Algorithms
    Doerr, Benjamin
    Ghannane, Yassine
    Ibn Brahim, Marouane
    PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'22), 2022, : 1390 - 1398
  • [50] Permutation-based true discovery guarantee by sum tests
    Vesely, Anna
    Finos, Livio
    Goeman, Jelle J.
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY, 2023, 85 (03) : 664 - 683