Abstract
In the context of iterated hash functions, "dithering" designates the technique of adding an iteration-dependent input to the compression function in order to defeat certain generic attacks. The purpose of this paper is to identify methods for dithering blockcipher-based hash functions that provide security bounds and efficiency, contrary to the previous proposals. We considered 56 different constructions, based on the 12 secure PGV schemes. Proofs are given in the blackbox model that 12 of them preserve the bounds on collision and inversion resistance given by Black et al. These 12 schemes avoid the need for short dither values, induce negligible extra-computation, and achieve security independent of the dither sequence used. We also identify 8 schemes that lead to strong compression functions but potentially insecure hash functions. Application of our results can be considered to popular hash functions like SHA-1 or Whirlpool.
Original language | English |
---|---|
Title of host publication | Progress in Cryptology - AFRICACRYPT 2008 - First International Conference on Cryptology in Africa, Proceedings |
Pages | 308-324 |
Number of pages | 17 |
DOIs | |
Publication status | Published - 2008 |
Externally published | Yes |
Event | International Conference on Cryptology in Africa (AFRICACRYPT) 2008 - Casablanca, Morocco Duration: 11 Jun 2008 → 14 Jun 2008 Conference number: 1st https://link.springer.com/book/10.1007/978-3-540-68164-9 (Proceedings) |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 5023 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | International Conference on Cryptology in Africa (AFRICACRYPT) 2008 |
---|---|
Abbreviated title | AFRICACRYPT 2008 |
Country/Territory | Morocco |
City | Casablanca |
Period | 11/06/08 → 14/06/08 |
Internet address |
|