New constructions for secure hash functions (Extended abstract)

被引:0
|
作者
Aiello, W [1 ]
Haber, S
Venkatesan, R
机构
[1] BELLCORE, Morristown, NJ 07960 USA
[2] Microsoft Res, Redmond, WA USA
来源
FAST SOFTWARE ENCRYPTION | 1998年 / 1372卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present new, efficient and practical schemes for construction of collision-resistant hash functions, and analyze some simple methods for combining existing hash-function designs so as to enhance their security. In our new constructions, we first map the input to a slightly longer string using a primitive we introduce called secure stretch functions. These are length-increasing almost surely injective one-way functions that sufficiently randomize their inputs so that it is hard for an adversary to force the outputs to fall into a target set. Then we apply a compression function to the output of the stretch function. We analyze the security of these constructions under different types of assumptions on both stretch and compression functions. These assumptions combine random-function models, intractability of certain "biasing" tasks, and the degeneracy structure of compression functions. The use of stretching seems to allow reduced requirements on the compression function, and may be of independent interest. These constructions allow one to use popular and efficient primitives such as MD5, SHA-1, and RIPEMD that may exhibit weaknesses as collision-resistant functions. But no attacks are currently known on their one-way and randomizing properties, when they are used as stretch functions as in our constructions. There are several collision-resistant hash functions based on DEs for which there are no known effective attacks, but which are too slow for most practical applications. Our use of stretch functions enable us to base our compression function on DEs so that the resulting hash function achieves practical speeds: a test implementation runs at 40% of the speed of MD5. We also suggest some imperfect random-oracle models, showing how to build better primitives from given imperfect ones. In this vein, we also analyze how to defend against a collision-finding adversary for a given primitive by building "independent" primitives.
引用
收藏
页码:150 / 167
页数:18
相关论文
共 50 条
  • [31] Inversion attacks on secure hash functions using SAT solvers
    De, Debapratim
    Kumarasubramanian, Abishek
    Venkatesan, Ramarathnam
    THEORY AND APPLICATIONS OF SATISFIABILITY TESTING - SAT 2007, PROCEEDINGS, 2007, 4501 : 377 - +
  • [32] Tightly Secure Lossy Trapdoor Functions: Constructions and Applications
    Qin, Baodong
    SECURITY AND COMMUNICATION NETWORKS, 2019,
  • [33] Tightly-Secure Signatures from Chameleon Hash Functions
    Blazy, Olivier
    Kakvi, Saqib A.
    Kiltz, Eike
    Pan, Jiaxin
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 256 - 279
  • [34] Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications
    Upadhyay, Darshana
    Gaikwad, Nupur
    Zaman, Marzia
    Sampalli, Srinivas
    IEEE ACCESS, 2022, 10 : 112472 - 112486
  • [35] Extended Abstract: New BTKi
    Coombs, Catherine C.
    CLINICAL LYMPHOMA MYELOMA & LEUKEMIA, 2022, 22 : S27 - S29
  • [36] One-round secure computation and secure autonomous mobile agents (Extended abstract)
    Cachin, C
    Camenisch, J
    Kilian, J
    Müller, J
    AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 512 - 523
  • [37] Efficient secure multi-party computation - (Extended abstract)
    Hirt, M
    Maurer, U
    Przydatek, B
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 143 - 161
  • [38] Protocols for collusion-secure asymmetric fingerprinting (extended abstract)
    Biehl, I
    Meyer, B
    STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1997, 1200 : 399 - 412
  • [39] Extended abstract: Forward-secure sequential aggregate authentication
    Ma, Di
    Tsudik, Gene
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 86 - +
  • [40] Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
    Wang, Peng
    Li, Yuling
    Zhang, Liting
    Zheng, Kaiyan
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 514 - 532