Provable Second Preimage Resistance Revisited

被引:0
|
作者
Bouillaguet, Charles [1 ]
Vayssiere, Bastien [2 ]
机构
[1] Univ Lille 1, LIFL, Lille, France
[2] Univ Versailles St Quentin Yvelines, PRISM Lab, Versailles, France
来源
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013 | 2014年 / 8282卷
关键词
Hash function; Second preimage resistance; Security proof; Unavoidable security loss; Black-box reductions; HASH FUNCTIONS; MERKLE-DAMGARD; ATTACKS;
D O I
10.1007/978-3-662-43414-7_26
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most cryptographic hash functions are iterated constructions, in which a mode of operation specifies how a compression function or a fixed permutation is applied. The Merkle-Damgard mode of operation is the simplest and more widely deployed mode of operation, yet it suffers from generic second preimage attacks, even when the compression function is ideal. In this paper we focus on provable security against second preimage attacks. Based on the study of several existing constructions, we describe simple properties of modes of operation and show that they are sufficient to allow some form of provable security, first in the random oracle model and then in the standard model. Our security proofs are extremely simple. We show for instance that the claims of the designers of Haifa regarding second preimage resistance are valid. Lastly, we give arguments that proofs of second preimage resistance by a black-box reduction incur an unavoidable security loss.
引用
收藏
页码:513 / 532
页数:20
相关论文
共 50 条
  • [1] Characterizing Collision and Second-Preimage Resistance in Linicrypt
    McQuoid, Ian
    Swope, Trevor
    Rosulek, Mike
    THEORY OF CRYPTOGRAPHY, TCC 2019, PT I, 2019, 11891 : 451 - 470
  • [2] Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners
    Bao, Zhenzhen
    Wang, Lei
    Guo, Jian
    Gu, Dawu
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 404 - 427
  • [3] Provable Preimage Under-Approximation for Neural Networks
    Zhang, Xiyue
    Wang, Benjie
    Kwiatkowska, Marta
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PT III, TACAS 2024, 2024, 14572 : 3 - 23
  • [4] Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
    Rogaway, P
    Shrimpton, T
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 371 - 388
  • [5] Second Preimage Analysis of Whirlwind
    AlTawy, Riham
    Youssef, Amr M.
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 311 - 328
  • [6] The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
    Guo, Jian
    Jean, Jeremy
    Leurent, Gaetan
    Peyrin, Thomas
    Wang, Lei
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 195 - 211
  • [7] Decisional Second-Preimage Resistance: When Does SPR Imply PRE?
    Bernstein, Daniel J.
    Hulsing, Andreas
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 33 - 62
  • [8] A second preimage attack on zipper hash
    Chen, Shiwei
    Jin, Chenhui
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2860 - 2866
  • [9] Second preimage attacks on dithered hash functions
    Andreeva, Elena
    Bouillaguet, Charles
    Fouque, Pierre-Alain
    Hoch, Jonathan J.
    Kelsey, John
    Shamir, Adi
    Zimmer, Sebastien
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 270 - +
  • [10] Second Preimage Attack on SHAMATA-512
    Ideguchi, Kota
    Watanabe, Dai
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 169 - 181