...
首页> 外文期刊>電子情報通信学会技術研究報告. 情報セキュリティ. Information Security >Constructing a Hash Function from a Weak Block Cipher in an Ideal Model
【24h】

Constructing a Hash Function from a Weak Block Cipher in an Ideal Model

机译:在理想模型中从弱块密码构建散列函数

获取原文
获取原文并翻译 | 示例

摘要

This paper discusses the provable security of block-cipher-based hash functions. It first introduces a new model called a weak ideal cipher model. In this model, an adversary is allowed to make key-disclosure queries to the oracle as well as encryption and decryption queries. A key-disclosure query is a pair of a plaintext and a ciphertext, and the reply is a corresponding key. Thus, in this model, a block cipher is random but completely insecure as a block cipher. It is shown that collision resistant hash functions can be constructed in this model. Hash functions indifferentiable from random oracles can also be constructed. This work is inspired by the compression function construction of a SHA-3 candidate Blue Midnight Wish. However, the results do not seem to have direct implications in its security.
机译:本文讨论了基于块密码的散列函数的可提供安全性。 它首先介绍了一个名为弱理想密码模型的新模型。 在此模型中,允许对孔的攻击性对oracle进行键,以及加密和解密查询。 密钥泄露查询是一对明文和密文,回复是相应的键。 因此,在该模型中,块密码是随机的,而是作为块密码完全不安全。 结果表明,可以在该模型中构建抗冲击散列函数。 也可以构建与随机牙齿无情的哈希函数。 这项工作受到SHA-3候选蓝午夜愿望的压缩函数建设的启发。 但是,结果似乎并不在其安全方面具有直接影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号