Analysis of double block length hash functions

被引:0
作者
Hattori, M [1 ]
Hirose, S [1 ]
Yoshida, S [1 ]
机构
[1] Kyoto Univ, Grad Sch Informat, Kyoto 6068501, Japan
来源
CRYPTOGRAPHY AND CODING, PROCEEDINGS | 2003年 / 2898卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The security of double block length hash functions and their compression functions is analyzed in this paper. First, the analysis of double block length hash functions by Satoh, Haga, and Kurosawa is investigated. The focus of this investigation is their analysis of the double block length hash functions with the rate 1 whose compression functions consist of a block cipher with the key twice longer than the plain-text/ciphertext. It is shown that there exists a case uncovered by their analysis. Second, the compression functions are analyzed with which secure double block length hash functions may be constructed. The analysis shows that these compression functions axe at most as secure as the compression functions of single block length hash functions.
引用
收藏
页码:290 / 302
页数:13
相关论文
共 9 条
[1]  
Black J, 2002, LECT NOTES COMPUT SC, V2442, P320
[2]  
DAMGARD IB, 1990, LECT NOTES COMPUT SC, V435, P416
[3]  
GIRAULT M, 1988, LECTURE NOTE COMPUTE, V330, P129
[4]   Attacks on fast double block length hash functions [J].
Knudsen, LR ;
Lai, XJ ;
Preneel, B .
JOURNAL OF CRYPTOLOGY, 1998, 11 (01) :59-72
[5]  
KNUDSEN LR, 1995, LNCS, V950, P410
[6]  
Menezes AJ., 1997, HDB APPL CRYPTOGRAPH
[7]  
Merkle R.C., 1989, LECTURE NOTES COMPUT, V435, P428
[8]  
Satoh A, 1999, ELECTRON COMM JPN 2, V82, P1, DOI 10.1002/(SICI)1520-6432(199903)82:3<1::AID-ECJB1>3.0.CO
[9]  
2-W