首页> 外文会议>International Colloquium on Automata, Languages and Programming >On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak
【24h】

On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak

机译:关于所有散列函数弱时串联哈希组合器的强度

获取原文

摘要

At Crypto 2004 Joux showed a novel attack against the concatenated hash combiner instantiated with Merkle-Damgard iterated hash functions. His method of producing multicollisions in the Merkle-Damgard design was the first in a recent line of generic attacks against the Merkle-Damgard construction. In the same paper, Joux raised an open question concerning the strength of the concatenated hash combiner and asked whether his attack can be improved when the attacker can efficiently find collisions in both underlying compression functions. We solve this open problem by showing that even in the powerful adversarial scenario first introduced by Liskov (SAC 2006) in which the underlying compression functions can be fully inverted (which implies that collisions can be easily generated), collisions in the concatenated hash cannot be created using fewer than 2{sup}(n/2) queries. We then expand this result to include the double pipe hash construction of Lucks from Asiacrypt 2005. One of the intermediate results is of interest on its own and provides the first streamable construction provably indifferentiable from a random oracle in this model.
机译:在Crypto 2004,Joux对Merkle-Damgard迭代哈希职能实例化了对抗串联哈希组合器的新攻击。他在Merkle-emgard设计中产生多种速度的方法是最近对Merkle-Mamgard建设的一系列通用攻击的方法。在同样的论文中,Joux提出了一个关于串联哈希组合器的强度的开放问题,并询问他的攻击是否可以在攻击者可以有效地发现底层压缩函数中的碰撞时得到改善。我们通过表明即使在Liskov(SAC 2006)引入的强大的对抗方案中,我们解决了这个公开问题,其中底层压缩函数可以完全反转(这意味着可能很容易地生成碰撞),所以串联散列中的冲突不能使用少于2 {sup}(n / 2)查询来创建。然后,我们将此结果扩展到2005年的运气中的运气哈希建设。其中一个中间结果对自己感兴趣,并从本模型中的随机甲骨文提供了第一步流动的施工。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号