Some Cryptanalytic Results on Zipper Hash and Concatenated Hash.

作者: Mridul Nandi , Ashwin Jha

DOI:

关键词:

摘要: At SAC 2006, Liskov proposed the zipper hash, a technique for constructing secure (indifferentiable from random oracles) hash functions based on weak (invertible) compression functions. Zipper is two pass scheme, which makes it unfit practical consideration. But, theoretical point of view seemed to be secure, as had resisted standard attacks long. Recently, Andreeva et al. gave forced-suffix herding attack and Chen Jin showed second preimage provided f1 strong invertible. In this paper, we analyse construction under oracle model well when underlying have some weakness. We show (second) preimage, an n-bit its relaxed variant with = f2, all require less than 2 n online computations. Hoch Shamir shown that concatenated offers only bits security both are bound tight even one

参考文章(42)
Antoine Joux, Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions Advances in Cryptology – CRYPTO 2004. pp. 306- 316 ,(2004) , 10.1007/978-3-540-28628-8_19
Eli Biham, Orr Dunkelman, A Framework for Iterative Hash Functions — HAIFA ? IACR Cryptology ePrint Archive. ,vol. 2007, pp. 278- ,(2007)
Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang, The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function selected areas in cryptography. ,vol. 2014, pp. 195- 211 ,(2014) , 10.1007/978-3-319-13051-4_12
Tuomas Kortelainen, Juha Kortelainen, On Diamond Structures and Trojan Message Attacks international conference on the theory and application of cryptology and information security. pp. 524- 539 ,(2013) , 10.1007/978-3-642-42045-0_27
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer, New Second-Preimage Attacks on Hash Functions Journal of Cryptology. ,vol. 29, pp. 657- 696 ,(2016) , 10.1007/S00145-015-9206-4
Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sebastien Zimmer, Second Preimage Attacks on Dithered Hash Functions Advances in Cryptology – EUROCRYPT 2008. ,vol. 4965, pp. 270- 288 ,(2008) , 10.1007/978-3-540-78967-3_16
Jonathan J. Hoch, Adi Shamir, On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak Automata, Languages and Programming. pp. 616- 630 ,(2008) , 10.1007/978-3-540-70583-3_50
Oded Goldreich, Foundations of Cryptography: Basic Tools Cambridge University Press. ,(2000)
Moses Liskov, Constructing an ideal hash function from weak ideal compression functions international conference on selected areas in cryptography. pp. 358- 375 ,(2006) , 10.1007/978-3-540-74462-7_25
Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar, Improved time-memory trade-offs with multiple data international conference on selected areas in cryptography. pp. 110- 127 ,(2005) , 10.1007/11693383_8