Some properties of an FSE 2005 Hash Proposal

نویسنده

  • Lars R. Knudsen
چکیده

We consider the hash function proposals by Mridul et al. presented at FSE 2005. For the proposed 2n-bit compression functions it is proved that collision attacks require Ω(2) queries of the functions in question. In this note it is shown that with O(2n/3) queries one can distinguish the proposed compression functions from a randomly chosen 2n-bit function with very good probability. Finally we note that our results do not seem to contradict any statements made the designers of the compression functions. 1 The 1/3 rate proposal from FSE 2005 [1] introduces several new constructions for hash function compression functions of varying hash rates, cf. later. We consider first the compression function of rate 1/3. Let fi : {0, 1}2n → {0, 1}n be independent random functions, for i = 1, 2, 3. Define the compression function F : {0, 1}3n → {0, 1}2n F (x, y, z) = (F1(x, y, z) | F2(x, y, z)) = (f1(x, y)⊕ f2(y, z) | f2(y, z)⊕ f3(z, x)) This function has a rate of 1/3: it compresses one block of n bits with three evaluations of the f -functions. First we note that F1(x, y, z)⊕F2(x, y, z) = (f1(x, y)⊕f3(z, x)) and thus this sum is independent of f2. The idea of the distinguishing attack is to find two sets of values x1, y1, z1 and x2, y2, z2 such that f1(x1, y1)⊕ f3(z1, x1) = f1(x2, y2)⊕ f3(z2, x2).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forging Attacks on two Authenticated Encryptions COBRA and POET

In FSE 2014, an authenticated encryption mode COBRA [4], based on pseudorandom permutation (PRP) blockcipher, and POET [3], based on Almost XOR-Universal (AXU) hash and strong pseudorandom permutation (SPRP), were proposed. Few weeks later, COBRA mode and a simple variant of the original proposal of POET (due to a forging attack [13] on the original proposal) with AES as an underlying blockciph...

متن کامل

SMASH - A Cryptographic Hash Function

1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and on RIPEMD, there is a need to consider other hash function design strategies. The paper presents also a concrete hash function design named SMASH. One version has a hash code of 256 bits and appears to be at least as ...

متن کامل

Cryptanalysis of RadioGatún

In this paper we study the security of the RadioGatún family of hash functions, and more precisely the collision resistance of this proposal. We show that it is possible to find differential paths with acceptable probability of success. Then, by using the freedom degrees available from the incoming message words, we provide a significant improvement over the best previously known cryptanalysis....

متن کامل

Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions

The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today (including the MD and SHA families) have an iterated design, it is important to study the general security properties of such functions. At Crypto 2004 Joux showed that in any iterated hash function it is relatively e...

متن کامل

Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

In this paper, we revisit security notions for dedicated-key hash functions, considering two essential theoretical aspects; namely, formal definitions for security notions, and the relationships among them. Our contribution is twofold. First, we provide a new set of enhanced security notions for dedicated-key hash functions. The provision of this set of enhanced properties has been motivated by...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2005  شماره 

صفحات  -

تاریخ انتشار 2005