【24h】

On the Impact of Known-Key Attacks on Hash Functions

机译:关于已知关键攻击对哈希函数的影响

获取原文

摘要

Hash functions are often constructed based on permutations or blockciphers, and security proofs are typically done in the ideal permutation or cipher model. However, once these random primitives are instantiated, vulnerabilities of these instantiations may nullify the security. At ASIACRYPT 2007, Knudsen and Rijmen introduced known-key security of blockciphers, which gave rise to many distinguishing attacks on existing blockcipher constructions. In this work, we analyze the impact of such attacks on primitive-based hash functions. We present and formalize the weak cipher model, which captures the case a blockcipher has a certain weakness but is perfectly random otherwise. A specific instance of this model, considering the existence of sets of B queries whose XOR equals 0 at bit-positions C, where C is an index set, covers a wide range of known-key attacks in literature. We apply this instance to the PGV compression functions, as well as to the Grostl (based on two permutations) and Shrimpton-Stam (based on three permutations) compression functions, and show that these designs do not seriously succumb to any differential known-key attack known to date.
机译:散列函数通常基于置换或块屏幕构建,安全性证明通常在理想的置换或密码模型中完成。但是,一旦实例化了这些随机基元,这些实例化的漏洞可能会使安全性无效。在Asiancrypt 2007中,Knudsen和Rijmen介绍了块的关键安全性,这会产生许多对现有块配置的攻击。在这项工作中,我们分析了这种攻击对基于原始的哈希函数的影响。我们呈现并正式化弱密码模型,该模型捕获块密封具有一定的弱点,但否则是完全随机的。考虑到在位位置C处的XOR等于0的B个查询的存在的特定实例,其中C是索引集,涵盖了文献中的广泛的已知关键攻击。我们将这种实例应用于PGV压缩功能,以及Grostl(基于两个排列)和虾 - STAM(基于三个排列)压缩功能,并显示这些设计不会严重屈服于任何差异已知的键迄今为止的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号