Proposals for Iterated Hash Functions

被引:0
|
作者
Knudsen, Lars R. [1 ]
Thomsen, Soren S. [1 ]
机构
[1] Tech Univ Denmark, Dept Math, DK-2800 Lyngby, Denmark
关键词
Cryptographic hash functions; Merkle-Damgard constructions; multicollisions; birthday attacks;
D O I
暂无
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned into constructions of our proposed type.
引用
收藏
页码:107 / 118
页数:12
相关论文
共 50 条
  • [1] Proposals for iterated hash functions
    Knudsen, Lars R.
    Thomsen, Soren S.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 246 - +
  • [2] Variants of Multicollision Attacks on Iterated Hash Functions
    Kortelainen, Tuomas
    Kortelainen, Juha
    Halunen, Kimmo
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 139 - +
  • [3] Multicollision attacks and generalized iterated hash functions
    Kortelainen, Juha
    Halunen, Kimmo
    Kortelainen, Tuomas
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (03) : 239 - 270
  • [4] Second preimages for iterated hash functions and their implications on MACs
    Pramstaller, Norbert
    Lamberger, Mario
    Rijmen, Vincent
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 68 - +
  • [5] Combinatorial multicollision attacks on generalized iterated hash functions
    Halunen, Kimmo
    Kortelainen, Juha
    Kortelainen, Tuomas
    Conferences in Research and Practice in Information Technology Series, 2010, 105 : 86 - 93
  • [6] Multicollisions in iterated hash functions. Application to cascaded constructions
    Joux, A
    ADVANCS IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 306 - 316
  • [7] One-way hash functions based on iterated chaotic systems
    Peng, Fei
    Qiu, Shui-Sheng
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 1070 - +
  • [8] Quantum Security of Hash Functions and Property-Preservation of Iterated Hashing
    Hamlin, Ben
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 329 - 349
  • [9] MPP Characteristics of Variants of Merkle-Damgard Iterated Hash Functions
    Nakamura, Shungo
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 93 - 101
  • [10] Breaking the ICE - Finding multicollisions in iterated concatenated and expanded (ICE) hash functions
    Hoch, Jonathan J.
    Shamir, Adi
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 179 - 194