The suffix-free-prefix-free hash function construction and its indifferentiability security analysis

被引:9
|
作者
Bagheri, Nasour [1 ]
Gauravaram, Praveen [2 ]
Knudsen, Lars R. [3 ]
Zenner, Erik [4 ]
机构
[1] Shahid Rajaee Teacher Training Univ, Dept Elect Engn, Tehran 1678815811, Iran
[2] Tata Consultancy Serv Ltd, Tata Consultancy Serv Innovat Labs, Hyderabad 500081, Andhra Pradesh, India
[3] Tech Univ Denmark, Dept Math, DK-2800 Lyngby, Denmark
[4] Univ Appl Sci Offenburg, D-77652 Offenburg, Germany
关键词
Indifferentiability; Merkle-Damgard; MD strengthening; Random oracle; SFPF;
D O I
10.1007/s10207-012-0175-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (I V) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle-Damgard (MD) strengthening in the padding functionality of the hash functions. We propose a generic n-bit-iterated hash function framework based on an n-bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary I Vs and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n-bit-iterated hash function based on an n-bit compression function and with an n-bit chaining value that is proven indifferentiable from a RO.
引用
收藏
页码:419 / 434
页数:16
相关论文
共 50 条
  • [21] Secure and efficient parallel hash function construction and its application on cloud audit
    Yijun Yang
    Fei Chen
    Zhiwei Sun
    Shulan Wang
    Jianqiang Li
    Jianyong Chen
    Zhong Ming
    Soft Computing, 2019, 23 : 8907 - 8925
  • [22] Denying Collision In The Second Round of Keccak Hash Function by Camouflaging Free Bits
    Dewi, Ratna Puspita
    Barmawi, Ari Moesriami
    2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2016,
  • [23] Secure and efficient parallel hash function construction and its application on cloud audit
    Yang, Yijun
    Chen, Fei
    Sun, Zhiwei
    Wang, Shulan
    Li, Jianqiang
    Chen, Jianyong
    Ming, Zhong
    SOFT COMPUTING, 2019, 23 (18) : 8907 - 8925
  • [24] The construction of free-free flexibility matrices for multilevel structural analysis
    Felippa, CA
    Park, KC
    COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 2002, 191 (19-20) : 2111 - 2140
  • [25] Security analysis of a one-way hash function based on spatiotemporal chaos
    王世红
    单鹏洋
    Chinese Physics B, 2011, (09) : 87 - 93
  • [26] Security analysis of a one-way hash function based on spatiotemporal chaos
    Wang Shi-Hong
    Shan Peng-Yang
    CHINESE PHYSICS B, 2011, 20 (09)
  • [27] Hash-Function Based PRFs: AMAC and Its Multi-User Security
    Bellare, Mihir
    Bernstein, Daniel J.
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 566 - 595
  • [28] An SVD Free Construction of an Indicator Function as an Imaging Algorithm
    Kim, K.
    Leem, K. H.
    Pelekanos, G.
    JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, 2014, 16 (04) : 731 - 739
  • [29] Experimental free-space quantum secure direct communication and its security analysis
    Pan, Dong
    Lin, Zaisheng
    Wu, Jiawei
    Zhang, Haoran
    Sun, Zhen
    Ruan, Dong
    Yin, Liuguo
    Long, Gui Lu
    PHOTONICS RESEARCH, 2020, 8 (09) : 1522 - 1531
  • [30] Experimental free-space quantum secure direct communication and its security analysis
    DONG PAN
    ZAISHENG LIN
    JIAWEI WU
    HAORAN ZHANG
    ZHEN SUN
    DONG RUAN
    LIUGUO YIN
    GUI LU LONG
    Photonics Research, 2020, 8 (09) : 1522 - 1531