首页> 外文期刊>電子情報通信学会技術研究報告. 情報セキュリティ. Information Security >Constructing a Hash Function from a Weak Block Cipher in an Ideal Model
【24h】

Constructing a Hash Function from a Weak Block Cipher in an Ideal Model

机译:在理想模型中用弱块密码构造哈希函数

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

This paper discusses the provable security of block-cipher-based hash functions. It first introduces a new model called a weak ideal cipher model. In this model, an adversary is allowed to make key-disclosure queries to the oracle as well as encryption and decryption queries. A key-disclosure query is a pair of a plaintext and a ciphertext, and the reply is a corresponding key. Thus, in this model, a block cipher is random but completely insecure as a block cipher. It is shown that collision resistant hash functions can be constructed in this model. Hash functions indifferentiable from random oracles can also be constructed. This work is inspired by the compression function construction of a SHA-3 candidate Blue Midnight Wish. However, the results do not seem to have direct implications in its security.
机译:本文讨论了基于分组密码的哈希函数的可证明安全性。首先介绍了一种称为弱理想密码模型的新模型。在此模型中,允许对手对oracle进行密钥公开查询以及加密和解密查询。密钥公开查询是一对明文和一个密文,而答复是一个对应的密钥。因此,在该模型中,分组密码是随机的,但是作为分组密码是完全不安全的。结果表明,可以在该模型中构造抗冲突哈希函数。也可以构造从随机预言中不可区分的哈希函数。这项工作的灵感来自SHA-3候选“ Blue Midnight Wish”的压缩功能构造。但是,结果似乎对其安全性没有直接影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号