New constructions for secure hash functions (Extended abstract)

被引:0
|
作者
Aiello, W [1 ]
Haber, S
Venkatesan, R
机构
[1] BELLCORE, Morristown, NJ 07960 USA
[2] Microsoft Res, Redmond, WA USA
来源
FAST SOFTWARE ENCRYPTION | 1998年 / 1372卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present new, efficient and practical schemes for construction of collision-resistant hash functions, and analyze some simple methods for combining existing hash-function designs so as to enhance their security. In our new constructions, we first map the input to a slightly longer string using a primitive we introduce called secure stretch functions. These are length-increasing almost surely injective one-way functions that sufficiently randomize their inputs so that it is hard for an adversary to force the outputs to fall into a target set. Then we apply a compression function to the output of the stretch function. We analyze the security of these constructions under different types of assumptions on both stretch and compression functions. These assumptions combine random-function models, intractability of certain "biasing" tasks, and the degeneracy structure of compression functions. The use of stretching seems to allow reduced requirements on the compression function, and may be of independent interest. These constructions allow one to use popular and efficient primitives such as MD5, SHA-1, and RIPEMD that may exhibit weaknesses as collision-resistant functions. But no attacks are currently known on their one-way and randomizing properties, when they are used as stretch functions as in our constructions. There are several collision-resistant hash functions based on DEs for which there are no known effective attacks, but which are too slow for most practical applications. Our use of stretch functions enable us to base our compression function on DEs so that the resulting hash function achieves practical speeds: a test implementation runs at 40% of the speed of MD5. We also suggest some imperfect random-oracle models, showing how to build better primitives from given imperfect ones. In this vein, we also analyze how to defend against a collision-finding adversary for a given primitive by building "independent" primitives.
引用
收藏
页码:150 / 167
页数:18
相关论文
共 50 条
  • [1] Constructions and Attacks on Hash Functions
    Al-Odat, Zeyad A.
    Khan, Samee U.
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 139 - 144
  • [2] New constructions of universal hash functions based on function sums
    Khoo, Khoongming
    Heng, Swee-Huay
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 416 - 425
  • [3] RC4-Hash: A new hash function based on RC4 - (Extended abstract)
    Chang, Donghoon
    Gupta, Kishan Chand
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 80 - +
  • [4] Towards secure and fast hash functions
    Satoh, T
    Haga, M
    Kurosawa, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01): : 55 - 62
  • [5] New constructions and practical applications for private stream searching - (Extended abstract)
    Bethencourt, John
    Song, Dawn
    Waters, Brent
    2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 132 - +
  • [6] Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices
    Zhu, Yan
    Wang, Shanbiao
    Ma, Di
    Hu, Hongxin
    Ahn, Gail-Joon
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 949 - 954
  • [7] Coercive subtyping for the calculus of constructions (extended abstract)
    Chen, G
    ACM SIGPLAN NOTICES, 2003, 38 (01) : 150 - 159
  • [8] Equational systems and free constructions - (EXTENDED ABSTRACT)
    Fiore, Marcelo
    Hur, Chung-Kil
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2007, 4596 : 607 - +
  • [9] Constructions of sparse asymmetric connectors extended abstract
    Baltz, A
    Jäger, G
    Srivastav, A
    FST TCS 2003: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, 2003, 2914 : 13 - 22
  • [10] Provably secure steganography - (Extended abstract)
    Hopper, NJ
    Langford, J
    von Ahn, L
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 77 - 92