Building Application-Agile Hash Functions: the MCM Construction

ثبت نشده
چکیده

Hash functions are often expected to provide security across applications, even if there is no formal backing for these expectations. For example SHA-1 is used variously as a collision-resistant hash function and as a real-world instantiation of a random oracle; recent attacks make either use less palatable. Better security would be provided by provable collision-resistance (resting on some underlying computational hardness assumption) and, simultaneously, some guarantee of randomoracle-like behavior. We call a hash function achieving these goals application agile. Unfortunately, known provably CR hash functions do not typically meet both goals, as the underlying structure that allows for provable collision-resistance negates any hope of behaving like a random oracle. This paper begins the investigation of application-agile hashing, and offers a generic construction for building such objects. Our MCM construction, applied to any provably CR hash function with good regularity properties, produces the first hash function simultaneously provably CR in the standard model and indifferentiable from a random oracle in the ideal cipher model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Build a Hash Function from Any Collision-Resistant Function

Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision in a provably CR function implies the ability to solve some hard problem (e.g., factoring). Unfortunately, existing provably CR functions make poor replacements for hash functions as they fail to deliver behaviors deman...

متن کامل

Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles

We revisit the problem of building dual-model secure (DMS) hash functions that are simultaneously provably collision resistant (CR) in the standard model and provably pseudorandom oracle (PRO) in an idealized model. Designing a DMS hash function was first investigated by Ristenpart and Shrimpton (ASIACRYPT 2007); they put forth a generic approach, called Mix-Compress-Mix (MCM), and showed the f...

متن کامل

A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical

The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to the construction of a full-fledged hash function from an underlying simpler hash function H and a further primitive F (such as a block cipher), with the property that collision resistance of the construction only rel...

متن کامل

Integration of Analytical Quality Assurance Methods into Agile Software Construction Practice Research Proposal for a Family of Controlled Experiments

Defects in early software development products, e.g., design specifications, can have a major impact on product quality. Analytical quality assurance methods, like Software Inspections and Testing are common practices for detecting non-conformities in software products. Often, these quality assurance (QA) activities are not seen as integral part of software construction process but rather as ti...

متن کامل

Some Observations on Indifferentiability

At Crypto 2005, Coron et al. introduced a formalism to study the presence or absence of structural flaws in iterated hash functions: If one cannot differentiate a hash function using ideal primitives from a random oracle, it is considered structurally sound, while the ability to differentiate it from a random oracle indicates a structural weakness. This model was devised as a tool to see subtle...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007