Blockcipher-Based Hashing Revisited

作者: Martijn Stam

DOI: 10.1007/978-3-642-03317-9_5

关键词: CipherAlgorithmGeneralizationCollision resistanceBlock cipherHash functionComputer scienceCompression (functional analysis)

摘要: We revisit the rate-1 blockcipher based hash functions as first studied by Preneel, Govaerts and Vandewalle (Crypto'93) later extensively analysed Black, Rogaway Shrimpton (Crypto'02). analyse a further generalization where any pre- postprocessing is considered. This leads to clearer understanding of current classification schemes introduced Preneel et al. refined Black In addition, we also gain insight in chopped, overloaded supercharged compression functions. latter category propose two on single call whose collision resistance exceeds birthday bound cipher's blocklength.

参考文章(32)
Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton, Salvaging Merkle-Damgård for Practical Applications international cryptology conference. pp. 371- 388 ,(2009) , 10.1007/978-3-642-01001-9_22
Hongjun Wu, The Hash Function JH ,(2009)
Walter Hohl, Xuejia Lai, Thomas Meier, Christian Waldvogel, Security of Iterated Hash Functions Based on Block Ciphers international cryptology conference. pp. 379- 390 ,(1994) , 10.1007/3-540-48329-2_32
Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen, The Grindahl hash functions fast software encryption. pp. 39- 57 ,(2007) , 10.1007/978-3-540-74619-5_3
Stefan Lucks, A Collision-Resistant Rate-1 Double-Block-Length Hash Function dagstuhl seminar proceedings. pp. 0- ,(2007)
Ivan Bjerre Damgård, A design principle for hash functions international cryptology conference. pp. 416- 427 ,(1989) , 10.1007/0-387-34805-0_39
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, On the Indifferentiability of the Sponge Construction Advances in Cryptology – EUROCRYPT 2008. pp. 181- 197 ,(2008) , 10.1007/978-3-540-78967-3_11
Ralph C. Merkle, One way hash functions and DES international cryptology conference. pp. 428- 446 ,(1989) , 10.1007/0-387-34805-0_40
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Ueli Maurer, Renato Renner, Clemens Holenstein, Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology theory of cryptography conference. ,vol. 2951, pp. 21- 39 ,(2004) , 10.1007/978-3-540-24638-1_2