New constructions for secure hash functions (Extended abstract)

被引:0
|
作者
Aiello, W [1 ]
Haber, S
Venkatesan, R
机构
[1] BELLCORE, Morristown, NJ 07960 USA
[2] Microsoft Res, Redmond, WA USA
来源
FAST SOFTWARE ENCRYPTION | 1998年 / 1372卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present new, efficient and practical schemes for construction of collision-resistant hash functions, and analyze some simple methods for combining existing hash-function designs so as to enhance their security. In our new constructions, we first map the input to a slightly longer string using a primitive we introduce called secure stretch functions. These are length-increasing almost surely injective one-way functions that sufficiently randomize their inputs so that it is hard for an adversary to force the outputs to fall into a target set. Then we apply a compression function to the output of the stretch function. We analyze the security of these constructions under different types of assumptions on both stretch and compression functions. These assumptions combine random-function models, intractability of certain "biasing" tasks, and the degeneracy structure of compression functions. The use of stretching seems to allow reduced requirements on the compression function, and may be of independent interest. These constructions allow one to use popular and efficient primitives such as MD5, SHA-1, and RIPEMD that may exhibit weaknesses as collision-resistant functions. But no attacks are currently known on their one-way and randomizing properties, when they are used as stretch functions as in our constructions. There are several collision-resistant hash functions based on DEs for which there are no known effective attacks, but which are too slow for most practical applications. Our use of stretch functions enable us to base our compression function on DEs so that the resulting hash function achieves practical speeds: a test implementation runs at 40% of the speed of MD5. We also suggest some imperfect random-oracle models, showing how to build better primitives from given imperfect ones. In this vein, we also analyze how to defend against a collision-finding adversary for a given primitive by building "independent" primitives.
引用
收藏
页码:150 / 167
页数:18
相关论文
共 50 条
  • [21] Symmetric hash functions for secure fingerprint biometric systems
    Tulyakov, Sergey
    Farooq, Faisal
    Mansukhani, Praveer
    Govindaraju, Venu
    PATTERN RECOGNITION LETTERS, 2007, 28 (16) : 2427 - 2436
  • [22] ON THE DESIGN OF PROVABLY-SECURE CRYPTOGRAPHIC HASH FUNCTIONS
    DESANTIS, A
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 412 - 431
  • [23] Recursive constructions of secure codes and hash families using difference function families
    Tonien, Dongvu
    Safavi-Naini, Reihaneh
    JOURNAL OF COMBINATORIAL THEORY SERIES A, 2006, 113 (04) : 664 - 674
  • [24] On the Security of the EMV Secure Messaging API (Extended Abstract)
    Adida, Ben
    Bond, Mike
    Clulow, Jolyon
    Lin, Amerson
    Anderson, Ross
    Rivest, Ronald L.
    SECURITY PROTOCOLS, 2010, 5964 : 147 - 149
  • [25] Intrusion-resilient secure channels (Extended abstract)
    Itkis, G
    McNerney, R
    Russell, S
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 238 - 253
  • [26] Secure Implementations of Typed Channel Abstractions (Extended Abstract)
    Bugliesi, Michele
    Giunti, Marco
    CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES, 2007, : 251 - 262
  • [27] Disjunctions for Hash Proof Systems: New Constructions and Applications
    Abdalla, Michel
    Benhamouda, Fabrice
    Pointcheval, David
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 69 - 100
  • [28] A reconfigurable implementation of the new secure hash algorithm
    Zeghid, M.
    Bouallegue, B.
    Baganne, A.
    Machhout, M.
    Tourki, R.
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 281 - +
  • [29] Some plausible constructions of double-block-length hash functions
    Hirose, Shoichi
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 210 - 225
  • [30] Secure Network Coding with Minimum Overhead Based on Hash Functions
    Adeli, Majid
    Liu, Huaping
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (12) : 956 - 958