Open problems in hash function security

被引:13
作者
Andreeva, Elena [1 ,2 ]
Mennink, Bart [1 ,2 ]
Preneel, Bart [1 ,2 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, ESAT COSIC, Leuven, Belgium
[2] iMinds, Ghent, Belgium
关键词
Hash functions; Compression functions; Reductions; Permutation based; Block cipher based; Open problems; BLOCK-LENGTH; MERKLE-DAMGARD; SECURITY/EFFICIENCY TRADEOFFS; DIGITAL-SIGNATURES; FINDING COLLISIONS; DOMAIN EXTENDERS; INDIFFERENTIABILITY; CONSTRUCTION; CRYPTANALYSIS; IMPOSSIBILITY;
D O I
10.1007/s10623-015-0096-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A cryptographic hash function compresses arbitrarily long messages to digests of a short and fixed length. Most of existing hash functions are designed to evaluate a compression function with a finite domain in a mode of operation, and the compression function itself is often designed from block ciphers or permutations. This modular design approach allows for a rigorous security analysis via means of both cryptanalysis and provable security. We present a survey on the state of the art in hash function security and modular design analysis. We focus on existing security models and definitions, as well as on the security aspects of designing secure compression functions (indirectly) from either block ciphers or permutations. In all of these directions, we identify open problems that, once solved, would allow for an increased confidence in the use of cryptographic hash functions.
引用
收藏
页码:611 / 631
页数:21
相关论文
共 130 条
[1]  
Abed F, 2014, LECT NOTES COMPUT SC, V8469, P440
[2]  
Andreeva Elena, 2011, Cryptography and Coding. 13th IMA International Conference, IMACC 2011. Proceedings, P152, DOI 10.1007/978-3-642-25516-8_10
[3]  
Andreeva E, 2007, LECT NOTES COMPUT SC, V4833, P130
[4]   Security Properties of Domain Extenders for Cryptographic Hash Functions [J].
Andreeva, Elena ;
Mennink, Bart ;
Preneel, Bart .
JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2010, 6 (04) :453-480
[5]   The parazoa family: generalizing the sponge hash functions [J].
Andreeva, Elena ;
Mennink, Bart ;
Preneel, Bart .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (03) :149-165
[6]  
Andreeva E, 2011, LECT NOTES COMPUT SC, V6531, P39
[7]  
Andreeva E, 2009, LECT NOTES COMPUT SC, V5381, P228, DOI 10.1007/978-3-642-04159-4_15
[8]  
Andreeva Elena, 2012, LECT NOTES COMPUTER, V7374, P287
[9]  
[Anonymous], 1993, LNCS
[10]  
[Anonymous], SUM CAPTURE PROBLEM