New constructions for secure hash functions (Extended abstract)

被引:0
|
作者
Aiello, W [1 ]
Haber, S
Venkatesan, R
机构
[1] BELLCORE, Morristown, NJ 07960 USA
[2] Microsoft Res, Redmond, WA USA
来源
FAST SOFTWARE ENCRYPTION | 1998年 / 1372卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present new, efficient and practical schemes for construction of collision-resistant hash functions, and analyze some simple methods for combining existing hash-function designs so as to enhance their security. In our new constructions, we first map the input to a slightly longer string using a primitive we introduce called secure stretch functions. These are length-increasing almost surely injective one-way functions that sufficiently randomize their inputs so that it is hard for an adversary to force the outputs to fall into a target set. Then we apply a compression function to the output of the stretch function. We analyze the security of these constructions under different types of assumptions on both stretch and compression functions. These assumptions combine random-function models, intractability of certain "biasing" tasks, and the degeneracy structure of compression functions. The use of stretching seems to allow reduced requirements on the compression function, and may be of independent interest. These constructions allow one to use popular and efficient primitives such as MD5, SHA-1, and RIPEMD that may exhibit weaknesses as collision-resistant functions. But no attacks are currently known on their one-way and randomizing properties, when they are used as stretch functions as in our constructions. There are several collision-resistant hash functions based on DEs for which there are no known effective attacks, but which are too slow for most practical applications. Our use of stretch functions enable us to base our compression function on DEs so that the resulting hash function achieves practical speeds: a test implementation runs at 40% of the speed of MD5. We also suggest some imperfect random-oracle models, showing how to build better primitives from given imperfect ones. In this vein, we also analyze how to defend against a collision-finding adversary for a given primitive by building "independent" primitives.
引用
收藏
页码:150 / 167
页数:18
相关论文
共 50 条
  • [11] New results on unconditionally secure distributed oblivious transfer (Extended abstract)
    Blundo, C
    D'Arco, P
    De Santis, A
    Stinson, DR
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 291 - 309
  • [12] Correlated-Input Secure Hash Functions
    Goyal, Vipul
    O'Neill, Adam
    Rao, Vanishree
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 182 - 200
  • [13] TWISTER - A Framework for Secure and Fast Hash Functions
    Fleischmann, Ewan
    Forler, Christian
    Gorski, Michael
    Lucks, Stefan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 257 - +
  • [14] One-Round Secure Multiparty Computation of Arithmetic Streams and Functions (Extended Abstract)
    Bitan, Dor
    Dolev, Shlomi
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2018, 2018, 10879 : 255 - 273
  • [15] A secure protocol for the oblivious transfer (extended abstract)
    Fischer, MJ
    Micali, S
    Rackoff, C
    JOURNAL OF CRYPTOLOGY, 1996, 9 (03) : 191 - 195
  • [16] On forward-secure storage - Extended abstract
    Dziembowski, Stefan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 251 - 270
  • [17] Visualization for Secure Coding in C Extended Abstract
    Walker, James
    Mayo, Jean
    Shene, Ching-Kuang
    Carr, Steve
    ITICSE'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2017, : 372 - 372
  • [18] Secure multiparty computation of approximations - (Extended abstract)
    Feigenbaum, J
    Ishai, Y
    Malkin, T
    Nissim, K
    Strauss, MJ
    Wright, RN
    AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 927 - 938
  • [19] Multicollisions in iterated hash functions. Application to cascaded constructions
    Joux, A
    ADVANCS IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 306 - 316
  • [20] A secure user authentication scheme using hash functions
    Yoon, Eun-Jun
    Ryu, Eun-Kyung
    Yoo, Kee-Young
    Operating Systems Review (ACM), 2004, 38 (02): : 62 - 68