A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions

作者: Vlastimil Klíma

DOI:

关键词:

摘要: In this paper, we present new security proofs of well-known hash constructions NMAC/HMAC proposed by Bellare et al. in 1996. We show that block ciphers should be used functions another way than it has been so far. introduce a cryptographic primitive called special cipher (SBC) which is resistant to attacks specific for functions. propose use SBC the constructions, what gives rise concept Special NMAC (SNMAC). From our follows SNMAC are computationally preimage and collision attacks. Moreover, at CRYPTO 2005 Coron proved indifferentiable from random oracle limit. construction general enables various proposals using different instances ciphers. DN (Double Net) define function HDN (Hash Double as based on DN.

参考文章(35)
Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen, The impact of carries on the complexity of collision attacks on SHA-1 fast software encryption. pp. 278- 292 ,(2006) , 10.1007/11799313_18
Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung, Amplified Boomerang Attack against Reduced-Round SHACAL international conference on the theory and application of cryptology and information security. pp. 243- 253 ,(2002) , 10.1007/3-540-36178-2_15
Shimon Even, Yishay Mansour, A Construction of a Cioher From a Single Pseudorandom Permutation international cryptology conference. pp. 210- 224 ,(1991) , 10.1007/3-540-57332-1_17
Eli Biham, Orr Dunkelman, Nathan Keller, A Simple Related-Key Attack on the Full SHACAL-1 Lecture Notes in Computer Science. pp. 20- 30 ,(2006) , 10.1007/11967668_2
Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Junghwan Song, Related-Key Attacks on Reduced Rounds of SHACAL-2 Progress in Cryptology - INDOCRYPT 2004. ,vol. 3348, pp. 175- 190 ,(2004) , 10.1007/978-3-540-30556-9_15
Eli Biham, Orr Dunkelman, Nathan Keller, Related-Key boomerang and rectangle attacks theory and application of cryptographic techniques. pp. 507- 525 ,(2005) , 10.1007/11426639_30
Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen, Analysis of step-reduced SHA-256 fast software encryption. pp. 126- 143 ,(2006) , 10.1007/11799313_9
John Kelsey, Bruce Schneier, Second preimages on n -bit hash functions for much less than 2 n work theory and application of cryptographic techniques. pp. 474- 490 ,(2005) , 10.1007/11426639_28
Yongsup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2 australasian conference on information security and privacy. pp. 110- 122 ,(2004) , 10.1007/978-3-540-27800-9_10
Ivan Bjerre Damgård, A design principle for hash functions international cryptology conference. pp. 416- 427 ,(1989) , 10.1007/0-387-34805-0_39