A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators

被引:1
作者
Nuida, Koji [1 ]
Abe, Takuro [2 ]
Kaji, Shizuo [3 ]
Maeno, Toshiaki [4 ]
Numata, Yasuhide [5 ]
机构
[1] Natl Inst Sci & Technol AIST, Res Inst Secure Syst RISEC, Tsukuba, Ibaraki 3058568, Japan
[2] Kyoto Univ, Dept Mech Engn & Sci, Kyoto 6068501, Japan
[3] Yamaguchi Univ, Fac Sci, Dept Math Sci, Yamaguchi 7538512, Japan
[4] Meijo Univ, Dept Math, Nagoya, Aichi 4688502, Japan
[5] Shinshu Univ, Dept Math Sci, Nagano 3908621, Japan
关键词
Function density problem; hash function; pseudorandom generator; security evaluation;
D O I
10.1142/S0129054115500100
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we specify a class of mathematical problems, which we refer to as "Function Density Problems" (FDPs, in short), and point out novel connections of FDPs to the following two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1.), and constructions of provably secure pseudorandom generators (PRGs) with some enhanced security property introduced by Dubrov and Ishai (STOC 2006). Our argument aims at proposing new theoretical frameworks for these topics (especially for the former) based on FDPs, rather than providing some concrete and practical results on the topics. We also give some examples of mathematical discussions on FDFs, which would be of independent interest from mathematical viewpoints. Finally, we discuss possible directions of future research on other cryptographic applications of FDPs and on mathematical studies on FDPs themselves.
引用
收藏
页码:169 / 194
页数:26
相关论文
共 12 条
[1]  
[Anonymous], 1977, Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, STOC'77, page, DOI [10.1145/800105.803400, DOI 10.1145/800105.803400]
[2]  
[Anonymous], P EUROCRYPT 1988
[3]  
Blais E, 2014, LECT NOTES COMPUT SC, V8572, P235
[4]   A SIMPLE UNPREDICTABLE PSEUDORANDOM NUMBER GENERATOR [J].
BLUM, L ;
BLUM, M ;
SHUB, M .
SIAM JOURNAL ON COMPUTING, 1986, 15 (02) :364-383
[5]  
Dubrov B., 2006, STOC'06. Proceedings of the 38th Annual ACM Symposium on Theory of Computing, P711, DOI 10.1145/1132516.1132615
[6]  
Farashahi RR, 2007, LECT NOTES COMPUT SC, V4450, P426
[7]  
Henshall K., 2010, CHIC J THEORET COMPU, P1
[8]   On the Security of Pseudorandomized Information-Theoretically Secure Schemes [J].
Nuida, Koji ;
Hanaoka, Goichiro .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (01) :635-652
[9]  
Nuida K, 2011, LECT NOTES COMPUT SC, V7038, P144, DOI 10.1007/978-3-642-25141-2_10
[10]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017