Indifferentiable security analysis of popular hash functions with prefix-free padding

被引:0
|
作者
Chang, Donghoon [1 ]
Lee, Sangjin [1 ]
Nandi, Mridul [2 ]
Yung, Mori [3 ]
机构
[1] Korea Univ, CIST, Seoul 136701, South Korea
[2] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[3] Columbia Univ, Dept Comp Sci, RSA Labs, New York, NY 10027 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indifferentiability as a generalization of the concept of the indistinguishability of two systems. In Crypto'2005, Coron et al. [5] suggested to employ indifferentiability in generic analysis of bash functions and started by suggesting four constructions which enable eliminating all possible generic attacks against iterative hash functions. In this paper we continue this initial suggestion and we give a formal proof of indifferentiability and indifferentiable attack for prefix-free MD hash functions (for single block length (SBL) hash and also some double block length (DBL) constructions) in the random oracle model and in the ideal cipher model. In particular, we observe that there are sixteen PGV hash functions (with prefix-free padding) which are indifferentiable from random oracle model in the ideal cipher model.
引用
收藏
页码:283 / +
页数:3
相关论文
共 19 条
  • [1] Differentiability of four prefix-free PGV hash functions
    Kuwakado, Hidenori
    Hirose, Shoichi
    IEICE ELECTRONICS EXPRESS, 2009, 6 (13): : 955 - 958
  • [2] Evolutionary double-pipe prefix-free hash function
    Mirvaziri, Hamid
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2020, 41 (05): : 1175 - 1191
  • [3] Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
    Nandi, Mridul
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 171 - 184
  • [4] Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key
    Naito, Yusuke
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 225 - 242
  • [5] The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
    Bagheri, Nasour
    Gauravaram, Praveen
    Knudsen, Lars R.
    Zenner, Erik
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (06) : 419 - 434
  • [6] The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
    Nasour Bagheri
    Praveen Gauravaram
    Lars R. Knudsen
    Erik Zenner
    International Journal of Information Security, 2012, 11 : 419 - 434
  • [7] CANONICAL TREES, COMPACT PREFIX-FREE CODES, AND SUMS OF UNIT FRACTIONS: A PROBABILISTIC ANALYSIS
    Heuberger, Clemens
    Krenn, Daniel
    Wagner, Stephan
    SIAM JOURNAL ON DISCRETE MATHEMATICS, 2015, 29 (03) : 1600 - 1653
  • [8] A Cyclic Prefix-Free OFDM System Based on Iterative Extrapolation: Design and Performance Analysis
    Shi, Ke
    Fang, Xiaojie
    Zhang, Yusi
    Sha, Xuejun
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (12) : 7497 - 7510
  • [9] Hash Functions Based on Three Permutations: A Generic Security Analysis
    Mennink, Bart
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 330 - 347
  • [10] A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators
    Nuida, Koji
    Abe, Takuro
    Kaji, Shizuo
    Maeno, Toshiaki
    Numata, Yasuhide
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 144 - +