Security Analysis of Randomize-Hash-then-Sign Digital Signatures

被引:6
|
作者
Gauravaram, Praveen [1 ]
Knudsen, Lars R. [1 ]
机构
[1] Tech Univ Denmark, Dept Math, DK-2800 Lyngby, Denmark
关键词
Collision resistance; Compression function; Davies-Meyer; Digital signature; Hash function; Merkle-Damgard; Randomized hashing; RMX; Second preimage resistance; SHA-3 hash function competition; CHOSEN-PREFIX COLLISIONS; KEY-RECOVERY ATTACKS; ONE-WAY; CRYPTANALYSIS; SHA-0; MD5; HMAC; NMAC; AURORA-512; RESISTANCE;
D O I
10.1007/s00145-011-9109-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean's method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with 'built-in' randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
引用
收藏
页码:748 / 779
页数:32
相关论文
共 50 条
  • [1] Security Analysis of Randomize-Hash-then-Sign Digital Signatures
    Praveen Gauravaram
    Lars R. Knudsen
    [J]. Journal of Cryptology, 2012, 25 : 748 - 779
  • [2] On Randomizing Hash Functions to Strengthen the Security of Digital Signatures
    Gauravaram, Praveen
    Knudsen, Lars R.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 88 - 105
  • [3] Formalizing Hash-then-Sign Signatures
    Poettering, Bertram
    Rastikian, Simon
    [J]. PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 289 - 315
  • [4] The exact security of digital signatures - How to sign with RSA and Rabin
    Bellare, M
    Rogaway, P
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 399 - 416
  • [5] On the Instantiability of Hash-and-Sign RSA Signatures
    Dodis, Yevgeniy
    Haitner, Iftach
    Tentes, Aris
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 112 - 132
  • [6] Secure hash-and-sign signatures without the random oracle
    Gennaro, R
    Halevi, S
    Rabin, T
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 123 - 139
  • [7] Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures
    Chen, Yilei
    Genise, Nicholas
    Mukherjee, Pratyay
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 3 - 32
  • [8] Shorter Hash-and-Sign Lattice-Based Signatures
    Espitau, Thomas
    Tibouchi, Mehdi
    Wallet, Alexandre
    Yu, Yang
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 245 - 275
  • [9] Realizing Hash-and-Sign Signatures under Standard Assumptions
    Hohenberger, Susan
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 333 - +
  • [10] Security arguments for digital signatures and blind signatures
    Pointcheval, D
    Stern, J
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (03) : 361 - 396