Active Domain Expansion for Narrow-pipe Hash

نویسنده

  • Xigen Yao
چکیده

In this article, we give an approach to the problem of entropy and codomain reducing in a normal iterative hash function. The problem relies on the case of effective domain reducing which causes the empty set of a approximative probability e−1 in a iteration. We will keep, hold or recover the entropies by a way of Active Domain Expansion(ADE). ADE replaces the input message block by ∑ Mi in a normal iterative hash function. A sum block ∑ Mi is a sum of the foregoing i ”Encoded Blocks”. ADE makes the Sum Block ∑ Mi a big domain to satisfy a surjection function, it can recover the entropy and codomain.We put emphasis on succinct narrow-pipe hash in this paper and a normal narrow-pipe hash function can resist this reducing. keywords: domain expansion, entropy, narrow -pipe hash , surjection

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Active Domain Expansion for Normal Narrow-pipe Hash Functions

Recently several reports of Cryptology ePrint Archive showed the discovering that for a normal iterative hash function the entropy and codomain would reduce greatly,then some conclusions were given: Narrow-pipe hash functions couldn’t resist this reducing (But wide-pipe hash functions could.),and generic collision attacks on narrow-pipe hash functions would be faster than birthday paradox.The d...

متن کامل

Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions

In a recent note to the NIST hash-forum list, the following observation was presented: narrow-pipe hash functions differ significantly from ideal random functions H : {0, 1} → {0, 1} that map bit strings from a big domain where N = n + m, m ≥ n (n = 256 or n = 512). Namely, for an ideal random function with a big domain space {0, 1} and a finite co-domain space Y = {0, 1}, for every element y ∈...

متن کامل

Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates

In this note we show a consequence of the recent observation that narrow-pipe hash designs manifest an abberation from ideal random functions for finding collisions for those functions with complexities much lower than the so called generic birthday paradox lower bound. The problem is generic for narrow-pipe designs including classic Merkle-Damg̊ard designs but also recent narrow-pipe SHA-3 cand...

متن کامل

Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions?

In the last 7-8 months me and Klima have discovered several deficiencies of narrow-pipe cryptographic hash designs. It all started with a note to the hash-forum list that narrow-pipe hash functions are giving outputs that are pretty different than the output that we would expect from a random oracle that is mapping messages of arbitrary length to hash values of n-bits. Then together with Klima ...

متن کامل

Narrow-pipe SHA-3 candidates differ significantly from ideal random functions defined over big domains

In the SHA-3 competition 4 candidates in the second round are narrow-pipe designs. Those are: BLAKE, Hamsi, SHAvite-3 and Skein. In this paper we show that there exist many concrete cases when these functions differ significantly from ideal random functions H : {0, 1}N → {0, 1}n that map bit strings from a big domain where N = n + m, m ≥ n (n = 256 or n = 512). Our observation is simple: For an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012