Proposals for Iterated Hash Functions

被引:0
|
作者
Knudsen, Lars R. [1 ]
Thomsen, Soren S. [1 ]
机构
[1] Tech Univ Denmark, Dept Math, DK-2800 Lyngby, Denmark
关键词
Cryptographic hash functions; Merkle-Damgard constructions; multicollisions; birthday attacks;
D O I
暂无
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned into constructions of our proposed type.
引用
收藏
页码:107 / 118
页数:12
相关论文
共 50 条
  • [41] The state of cryptographic hash functions
    Preneel, B
    LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 158 - 182
  • [42] Cryptanalysis of Hash Functions with Structures
    Khovratovich, Dmitry
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 108 - 125
  • [43] Programmable hash functions and their applications
    Hofheinz, Dennis
    Kiltz, Eike
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 21 - 38
  • [44] A DESIGN PRINCIPLE FOR HASH FUNCTIONS
    DAMGARD, IB
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 416 - 427
  • [45] Programmable Hash Functions and Their Applications
    Hofheinz, Dennis
    Kiltz, Eike
    JOURNAL OF CRYPTOLOGY, 2012, 25 (03) : 484 - 527
  • [46] On hash functions using checksums
    Praveen Gauravaram
    John Kelsey
    Lars R. Knudsen
    Søren S. Thomsen
    International Journal of Information Security, 2010, 9 : 137 - 151
  • [47] Hash and displace: Efficient evaluation of minimal perfect hash functions
    Pagh, R
    ALGORITHMS AND DATA STRUCTURES, 1999, 1663 : 49 - 54
  • [48] Constructions and Attacks on Hash Functions
    Al-Odat, Zeyad A.
    Khan, Samee U.
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 139 - 144
  • [49] Cryptanalysis of the LSH hash functions
    Hao, Yonglin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3296 - 3308
  • [50] Increasing the security of hash functions
    Levin V.Y.
    Journal of Mathematical Sciences, 2011, 172 (5) : 734 - 739