Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
نویسندگان
چکیده
Two of the most recent and powerful multi-property-preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ESh) transform. The former was proposed by Andreeva et al. at ASIACRYPT 2007 and the latter was proposed by Bellare and Ristenpart at ICALP 2007. In the existing literature, ten notions of security for hash functions have been considered in analysis of MPP capabilities of domain extension transforms, namely CR, Sec, aSec, eSec (TCR), Pre, aPre, ePre, MAC, PRF, PRO. Andreeva et al. showed that ROX is able to preserve seven properties; namely collision resistance (CR), three flavors of second preimage resistance (Sec, aSec, eSec) and three variants of preimage resistance (Pre, aPre, ePre). Bellare and Ristenpart showed that ESh is capable of preserving five important security notions; namely CR, message authentication code (MAC), pseudorandom function (PRF), pseudorandom oracle (PRO), and target collision resistance (TCR). Nonetheless, there is no further study on these two MPP hash domain extension transforms with regard to the other properties. The aim of this paper is to fill this gap. Firstly, we show that ROX does not preserve two other widely-used and important security notions, namely MAC and PRO. We also show a positive result about ROX, namely that it also preserves PRF. Secondly, we show that ESh does not preserve other four properties, namely Sec, aSec, Pre, and aPre. On the positive side we show that ESh can preserve ePre property. Our results in this paper provide a full picture of the MPP capabilities of both ROX and ESh transforms by completing the property-preservation analysis of these transforms in regard to all ten security notions of interest, namely CR, Sec, aSec, eSec (TCR), Pre, aPre, ePre, MAC, PRF, PRO.
منابع مشابه
Security Properties of Domain Extenders for Cryptographic Hash Functions
Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most common procedure to extend the domain of a compression function in order to obtain ...
متن کاملP-139: Ram Sperm Motility Following 48 Hours of Refrigeration: Evaluation of Different Extenders for The Preservation of Ram Semen in Liquid State
Background: The application of laparoscopic method for intrauterine insemination is limited in sheep industry by the high cost of equipment and low pregnancy rate of frozen-thawed spermatozoa. Both disadvantages could be decreased if chilled ram semen is transported to the farms and inseminated through cervix. Semen extender provides the requirements for sperm and affects its motility, viabilit...
متن کاملP-73: Effect of Sodium Dodecyl Sulfate and Different Levels of Clove Bud Extract on Motility, Viability and Plasma Membrane Integrity of Ram Spermatozoa during Cooling and Cryopreservation
Background: Hen egg yolk is a common component of most semen cryopreservation extenders. However, diluents containing the egg yolk may have adverse effects on the quality of the semen. Egg yolk could be solubilized by the addition of sodium dodecyl sulphate (SDS) in semen extenders. Many studies have shown beneficial effects of antioxidants addition to semen freezing extenders. Antioxidants are...
متن کاملAn Investigation of the Enhanced Target Collision Resistance Property for Hash Functions
We revisit the enhanced target collision resistance (eTCR) property as a newly emerged notion of security for dedicated-key hash functions, which has been put forth by Halevi and Krawczyk at CRYPTO’06, in conjunction with the Randomized Hashing mode to achieve this property. Our contribution is twofold. Firstly, we provide a full picture of the relationships between eTCR and each of the seven s...
متن کاملSeven-Property-Preserving Iterated Hashing: ROX
Nearly all modern hash functions are constructed by iterating a compression function. At FSE’04, Rogaway and Shrimpton [RS04] formalized seven security notions for hash functions: collision resistance (Coll) and three variants of second-preimage resistance (Sec, aSec, eSec) and preimage resistance (Pre, aPre, ePre). The main contribution of this paper is in determining, by proof or counterexamp...
متن کامل