A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators

被引:1
|
作者
Nuida, Koji [1 ]
Abe, Takuro [2 ]
Kaji, Shizuo [3 ]
Maeno, Toshiaki [4 ]
Numata, Yasuhide [5 ]
机构
[1] Natl Inst Sci & Technol AIST, Res Inst Secure Syst RISEC, Tsukuba, Ibaraki 3058568, Japan
[2] Kyoto Univ, Dept Mech Engn & Sci, Kyoto 6068501, Japan
[3] Yamaguchi Univ, Fac Sci, Dept Math Sci, Yamaguchi 7538512, Japan
[4] Meijo Univ, Dept Math, Nagoya, Aichi 4688502, Japan
[5] Shinshu Univ, Dept Math Sci, Nagano 3908621, Japan
关键词
Function density problem; hash function; pseudorandom generator; security evaluation;
D O I
10.1142/S0129054115500100
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we specify a class of mathematical problems, which we refer to as "Function Density Problems" (FDPs, in short), and point out novel connections of FDPs to the following two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1.), and constructions of provably secure pseudorandom generators (PRGs) with some enhanced security property introduced by Dubrov and Ishai (STOC 2006). Our argument aims at proposing new theoretical frameworks for these topics (especially for the former) based on FDPs, rather than providing some concrete and practical results on the topics. We also give some examples of mathematical discussions on FDFs, which would be of independent interest from mathematical viewpoints. Finally, we discuss possible directions of future research on other cryptographic applications of FDPs and on mathematical studies on FDPs themselves.
引用
收藏
页码:169 / 194
页数:26
相关论文
共 50 条
  • [1] A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators
    Nuida, Koji
    Abe, Takuro
    Kaji, Shizuo
    Maeno, Toshiaki
    Numata, Yasuhide
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 144 - +
  • [2] A CONSTRUCTION FOR ONE WAY HASH FUNCTIONS AND PSEUDORANDOM BIT GENERATORS
    SADEGHIYAN, B
    PIEPRZYK, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 431 - 445
  • [3] Security & pseudorandom number generators
    Laurie, B
    DR DOBBS JOURNAL, 2004, 29 (03): : 46 - 47
  • [4] PSEUDORANDOM GENERATORS FOR POLYNOMIAL THRESHOLD FUNCTIONS
    Meka, Raghu
    Zuckerman, David
    SIAM JOURNAL ON COMPUTING, 2013, 42 (03) : 1275 - 1301
  • [5] ONE WAY FUNCTIONS AND PSEUDORANDOM GENERATORS
    LEVIN, LA
    COMBINATORICA, 1987, 7 (04) : 357 - 363
  • [6] Pseudorandom Generators for Polynomial Threshold Functions
    Meka, Raghu
    Zuckerman, David
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 427 - 436
  • [7] On the Security of Multivariate Hash Functions
    罗宜元
    来学嘉
    Journal of Shanghai Jiaotong University(Science), 2009, 14 (02) : 219 - 222
  • [8] A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
    Kang, Ju-Sung
    Kim, Nayoung
    Ju, Wangho
    Yi, Ok-Yeon
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 10 - 23
  • [9] Increasing the security of hash functions
    Levin V.Y.
    Journal of Mathematical Sciences, 2011, 172 (5) : 734 - 739
  • [10] On the security of multivariate hash functions
    Luo Y.-Y.
    Lai X.-J.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (02): : 219 - 222