The suffix-free-prefix-free hash function construction and its indifferentiability security analysis

被引:9
|
作者
Bagheri, Nasour [1 ]
Gauravaram, Praveen [2 ]
Knudsen, Lars R. [3 ]
Zenner, Erik [4 ]
机构
[1] Shahid Rajaee Teacher Training Univ, Dept Elect Engn, Tehran 1678815811, Iran
[2] Tata Consultancy Serv Ltd, Tata Consultancy Serv Innovat Labs, Hyderabad 500081, Andhra Pradesh, India
[3] Tech Univ Denmark, Dept Math, DK-2800 Lyngby, Denmark
[4] Univ Appl Sci Offenburg, D-77652 Offenburg, Germany
关键词
Indifferentiability; Merkle-Damgard; MD strengthening; Random oracle; SFPF;
D O I
10.1007/s10207-012-0175-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (I V) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle-Damgard (MD) strengthening in the padding functionality of the hash functions. We propose a generic n-bit-iterated hash function framework based on an n-bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary I Vs and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n-bit-iterated hash function based on an n-bit compression function and with an n-bit chaining value that is proven indifferentiable from a RO.
引用
收藏
页码:419 / 434
页数:16
相关论文
共 50 条
  • [1] The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
    Nasour Bagheri
    Praveen Gauravaram
    Lars R. Knudsen
    Erik Zenner
    International Journal of Information Security, 2012, 11 : 419 - 434
  • [2] Improved Indifferentiability Security Analysis of chopMD Hash Function
    Chang, Donghoon
    Nandi, Mridul
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 429 - +
  • [3] Indifferentiable security analysis of popular hash functions with prefix-free padding
    Chang, Donghoon
    Lee, Sangjin
    Nandi, Mridul
    Yung, Mori
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 283 - +
  • [4] New indifferentiability security proof of MDPH hash function
    Guo, Chun
    Iwata, Tetsu
    Minematsu, Kazuhiko
    IET INFORMATION SECURITY, 2022, 16 (04) : 262 - 281
  • [5] On Prefix/Suffix-Square Free Words
    Dumitran, Marius
    Manea, Florin
    Nowotka, Dirk
    STRING PROCESSING AND INFORMATION RETRIEVAL (SPIRE 2015), 2015, 9309 : 54 - 66
  • [6] Evolutionary double-pipe prefix-free hash function
    Mirvaziri, Hamid
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2020, 41 (05): : 1175 - 1191
  • [7] Complement on Prefix-Free, Suffix-Free, and Non-Returning NFA Languages
    Jiraskova, Galina
    Mlynarcik, Peter
    DESCRIPTIONAL COMPLEXITY OF FORMAL SYSTEMS, DCFS 2014, 2014, 8614 : 222 - 233
  • [8] Differentiability of four prefix-free PGV hash functions
    Kuwakado, Hidenori
    Hirose, Shoichi
    IEICE ELECTRONICS EXPRESS, 2009, 6 (13): : 955 - 958
  • [9] On the construction of prefix-free and fix-free codes with specified codeword compositions
    Kakhbod, Ali
    Zadimoghaddam, Morteza
    DISCRETE APPLIED MATHEMATICS, 2011, 159 (18) : 2269 - 2275
  • [10] Syntactic complexity of prefix-, suffix-, bifix-, and factor-free regular languages
    Brzozowski, Janusz
    Li, Baiyu
    Ye, Yuli
    THEORETICAL COMPUTER SCIENCE, 2012, 449 : 37 - 53