Some properties of an FSE 2005 Hash Proposal
نویسنده
چکیده
We consider the hash function proposals by Mridul et al. presented at FSE 2005. For the proposed 2n-bit compression functions it is proved that collision attacks require Ω(2) queries of the functions in question. In this note it is shown that with O(2n/3) queries one can distinguish the proposed compression functions from a randomly chosen 2n-bit function with very good probability. Finally we note that our results do not seem to contradict any statements made the designers of the compression functions. 1 The 1/3 rate proposal from FSE 2005 [1] introduces several new constructions for hash function compression functions of varying hash rates, cf. later. We consider first the compression function of rate 1/3. Let fi : {0, 1}2n → {0, 1}n be independent random functions, for i = 1, 2, 3. Define the compression function F : {0, 1}3n → {0, 1}2n F (x, y, z) = (F1(x, y, z) | F2(x, y, z)) = (f1(x, y)⊕ f2(y, z) | f2(y, z)⊕ f3(z, x)) This function has a rate of 1/3: it compresses one block of n bits with three evaluations of the f -functions. First we note that F1(x, y, z)⊕F2(x, y, z) = (f1(x, y)⊕f3(z, x)) and thus this sum is independent of f2. The idea of the distinguishing attack is to find two sets of values x1, y1, z1 and x2, y2, z2 such that f1(x1, y1)⊕ f3(z1, x1) = f1(x2, y2)⊕ f3(z2, x2).
منابع مشابه
Forging Attacks on two Authenticated Encryptions COBRA and POET
In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom permutation (PRP) blockcipher, and POET [3], based on Almost XOR-Universal (AXU) hash and strong pseudorandom permutation (SPRP), were proposed. Few weeks later, COBRA mode and a simple variant of the original proposal of POET (due to a forging attack [13] on the original proposal) with AES as an underlying blockciph...
متن کاملSMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and on RIPEMD, there is a need to consider other hash function design strategies. The paper presents also a concrete hash function design named SMASH. One version has a hash code of 256 bits and appears to be at least as ...
متن کاملCryptanalysis of RadioGatún
In this paper we study the security of the RadioGatún family of hash functions, and more precisely the collision resistance of this proposal. We show that it is possible to find differential paths with acceptable probability of success. Then, by using the freedom degrees available from the incoming message words, we provide a significant improvement over the best previously known cryptanalysis....
متن کاملBreaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today (including the MD and SHA families) have an iterated design, it is important to study the general security properties of such functions. At Crypto 2004 Joux showed that in any iterated hash function it is relatively e...
متن کاملEnhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
In this paper, we revisit security notions for dedicated-key hash functions, considering two essential theoretical aspects; namely, formal definitions for security notions, and the relationships among them. Our contribution is twofold. First, we provide a new set of enhanced security notions for dedicated-key hash functions. The provision of this set of enhanced properties has been motivated by...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2005 شماره
صفحات -
تاریخ انتشار 2005