Getting The Best Out Of Existing Hash Functions; Or What If We Are Stuck With Sha?

ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security(2008)

引用 21|浏览0
暂无评分
摘要
Cascade chaining is a very efficient and popular mode of operation for building various kinds of cryptographic hash functions. In particular, it is the basis of the most heavily utilized SHA function family. Recently, many researchers pointed out various practical. and theoretical deficiencies of this mode, which resulted in a renewed interest in building specialized modes of operations and new hash functions with better security. Unfortunately, it appears unlikely that a new hash function (say, based on a new mode of operation) would be widely adopted before being standardized, which is not expected to happen in the foreseeable future.Instead, it seems likely that practitioners would continue to use the cascade chaining, and the SHA family in particular, and try to work around the deficiencies mentioned above. In this paper we provide a thorough treatment of how to soundly design a secure hash function H' from a given cascade-based hash function H for various cryptographic applications, such as collision-resistance, one-wayness, pseudorandomness, etc. We require each proposed construction of H' to satisfy the following "axioms".1. The construction consists of one or two "black-box" calls to H.2. In particular, one is not allowed to know/use anything about the internals of H, such as modifying the initialization vector or affecting the value of the chaining variable.3. The construction should support variable-length inputs.4. Compared to a single evaluation of H(M), the evaluation of H'(M) should make at most a fixed (small constant) number of extra calls to the underlying compression function of H. In other words, the efficiency of H' is negligibly close to that of H.We discuss several popular modes of operation satisfying the above axioms. For each such mode and for each given desired security requirement, we discuss the weakest requirement on the compression function of H which would make this mode secure. We also give the implications of these results for using existing hash functions SHA-x, where x is an element of {1, 224, 256, 384, 512}.
更多
查看译文
关键词
new hash function,popular mode,cascade chaining,cascade-based hash function H,secure hash function H,SHA function family,compression function,cryptographic hash function,existing hash function,underlying compression function
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要