Proposals for Iterated Hash Functions

被引:0
|
作者
Knudsen, Lars R. [1 ]
Thomsen, Soren S. [1 ]
机构
[1] Tech Univ Denmark, Dept Math, DK-2800 Lyngby, Denmark
关键词
Cryptographic hash functions; Merkle-Damgard constructions; multicollisions; birthday attacks;
D O I
暂无
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned into constructions of our proposed type.
引用
收藏
页码:107 / 118
页数:12
相关论文
共 50 条
  • [21] CRYPTOGRAPHIC HASH FUNCTIONS
    PRENEEL, B
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1994, 5 (04): : 431 - 448
  • [22] Linear hash functions
    Alon, N
    Dietzfelbinger, M
    Miltersen, PB
    Petrank, E
    Tardos, G
    JOURNAL OF THE ACM, 1999, 46 (05) : 667 - 683
  • [23] On Randomness in Hash Functions
    Dietzfelbinger, Martin
    29TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, (STACS 2012), 2012, 14 : 25 - 28
  • [24] Dispersing Hash Functions
    Pagh, Rasmus
    RANDOM STRUCTURES & ALGORITHMS, 2009, 35 (01) : 70 - 82
  • [25] Iterated random functions
    Diaconis, P
    Freedman, D
    SIAM REVIEW, 1999, 41 (01) : 45 - 76
  • [26] ITERATED ARITHMETIC FUNCTIONS
    WHITE, GK
    NOTICES OF THE AMERICAN MATHEMATICAL SOCIETY, 1969, 16 (01): : 292 - &
  • [27] Iterated functions and intermittency
    V. Balakrishnan
    Resonance, 2001, 6 (1) : 18 - 27
  • [28] On the Design of Special Hash Functions for Multiple Hash Tables
    Serrano, Eleazar Jimenez
    2012 9TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2012,
  • [29] Universal hash functions for an infinite universe and hash trees
    Brass, Peter
    INFORMATION PROCESSING LETTERS, 2009, 109 (10) : 461 - 462
  • [30] Cryptanalysis of an Iterated Halving-based hash function: CRUSH
    Bagheri, N.
    Henricksen, M.
    Knudsen, L. R.
    Naderi, M.
    Sadeghyian, B.
    IET INFORMATION SECURITY, 2009, 3 (04) : 129 - 138