首页> 外文会议>International Workshop on Selected Areas in Cryptography(SAC 2006); 20060817-18; Montreal(CA) >Constructing an Ideal Hash Function from Weak Ideal Compression Functions
【24h】

Constructing an Ideal Hash Function from Weak Ideal Compression Functions

机译:从弱理想压缩函数构造理想哈希函数

获取原文
获取原文并翻译 | 示例

摘要

We introduce the notion of a weak ideal compression function, which is vulnerable to strong forms of attack, but is otherwise random. We show that such weak ideal compression functions can be used to create secure hash functions, thereby giving a design that can be used to eliminate attacks caused by undesirable properties of compression functions.We prove that the construction we give, which we call the "zipper hash," is ideal in the sense that the overall hash function is indistinguishable from a random oracle when implemented with these weak ideal building blocks.The zipper hash function is relatively simple, requiring two compression function evaluations per block of input, but it is not streamable. We also show how to create an ideal (strong) compression function from ideal weak compression functions, which can be used in the standard iterated way to make a streamable hash function.
机译:我们引入了弱理想压缩函数的概念,该函数易于遭受强形式的攻击,但否则是随机的。我们证明了这种弱的理想压缩函数可用于创建安全的哈希函数,从而提供一种可用于消除由压缩函数的不良特性引起的攻击的设计。我们证明了我们给出的构造,我们称之为“拉链”散列”是理想的,因为当使用这些弱理想构建块实现时,整个散列函数与随机预言器是无法区分的。拉链散列函数相对简单,每个输入块需要两次压缩函数评估,但并非如此流媒体。我们还展示了如何从理想的弱压缩函数创建理想的(强)压缩函数,该函数可以以标准迭代方式用于制作可流式哈希函数。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号