Proposals for Iterated Hash Functions

被引:0
|
作者
Knudsen, Lars R. [1 ]
Thomsen, Soren S. [1 ]
机构
[1] Tech Univ Denmark, Dept Math, DK-2800 Lyngby, Denmark
关键词
Cryptographic hash functions; Merkle-Damgard constructions; multicollisions; birthday attacks;
D O I
暂无
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned into constructions of our proposed type.
引用
收藏
页码:107 / 118
页数:12
相关论文
共 50 条
  • [31] Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
    Bao, Zhenzhen
    Guo, Jian
    Wang, Lei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (01) : 201 - 253
  • [32] Analysis of multivariate hash functions
    Aumasson, Jean-Philippe
    Meier, Willi
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 309 - 323
  • [33] Generating perfect Hash functions
    Gettys, T
    DR DOBBS JOURNAL, 2001, 26 (02): : 151 - +
  • [34] Energy Consumption of Hash Functions
    Damasevicius, R.
    Ziberkas, G.
    Stuikys, V.
    Toldinas, J.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2012, 18 (10) : 81 - 84
  • [35] Trapdoor Hash Functions and Their Applications
    Dottling, Nico
    Garg, Sanjam
    Ishai, Yuval
    Malavolta, Giulio
    Mour, Tamer
    Ostrovsky, Rafail
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 3 - 32
  • [36] On hash functions using checksums
    Gauravaram, Praveen
    Kelsey, John
    Knudsen, Lars R.
    Thomsen, Soren S.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (02) : 137 - 151
  • [37] Logical analysis of hash functions
    Jovanovic, D
    Janicic, P
    FRONTIERS OF COMBINING SYSTEMS, PROCEEDINGS, 2005, 3717 : 200 - 215
  • [38] On selectable collisionful hash functions
    Bakhtiari, S
    Safavi-Naini, R
    Pieprzyk, J
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 287 - 298
  • [39] On the Security of Multivariate Hash Functions
    罗宜元
    来学嘉
    Journal of Shanghai Jiaotong University(Science), 2009, 14 (02) : 219 - 222
  • [40] Programmable Hash Functions and Their Applications
    Dennis Hofheinz
    Eike Kiltz
    Journal of Cryptology, 2012, 25 : 484 - 527