Security/efficiency tradeoffs for permutation-based hashing

被引:0
|
作者
Rogaway, Phillip [1 ]
Steinberger, John [2 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[2] Univ British Columbia, Dept Math, Vancouver, BC V5Z 1M9, Canada
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008 | 2008年 / 4965卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We provide attacks and analysis that capture a tradeoff, in the ideal-permutation model, between the speed of a permutation-based hash function and its potential security. We show that any 2n-bit to n-bit compression function will have unacceptable collision resistance it makes fewer than three n-bit permutation invocations, and any 3n-bit to 2n-bit compression function will have unacceptable security if it makes fewer than five n-bit permutation invocations. Any rate-a hash function built from n-bit permutations can be broken, in the sense of finding preimages as well as collisions, in about N1-alpha queries, where N = 2(n). Our results provide guidance when trying to design or analyze a permutation-based hash function about the limits of what can possibly be done.
引用
收藏
页码:220 / +
页数:4
相关论文
共 50 条
  • [1] Permutation-Based Hashing Beyond the Birthday Bound
    Lefevre, Charlotte
    Mennink, Bart
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 71 - 113
  • [2] Phasing: Private Set Intersection using Permutation-based Hashing
    Pinkas, Benny
    Schneider, Thomas
    Segev, Gil
    Zohner, Michael
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 515 - 530
  • [3] Breaking Permutation-Based Mesh Steganography and Security Improvement
    Wang, Yimin
    Kong, Lingsheng
    Qian, Zhenxing
    Feng, Guorui
    Zhang, Xinpeng
    Zheng, Jianmin
    IEEE ACCESS, 2019, 7 : 183300 - 183310
  • [4] Permutation-Based Lightweight Authenticated Cipher with Beyond Conventional Security
    Zhang, Ping
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [5] Beyond-birthday security for permutation-based Feistel networks
    Guo, Chun
    Zhang, Guoyan
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (03) : 407 - 440
  • [6] Security of permutation-based compression function lp231
    Lee, Jooyoung
    Kwon, Daesung
    INFORMATION PROCESSING LETTERS, 2014, 114 (07) : 372 - 381
  • [7] Permutation-Based Lightweight Authenticated Cipher with beyond Conventional Security
    Zhang, Ping
    Security and Communication Networks, 2021, 2021
  • [8] TIGHT SECURITY ANALYSIS OF THE PUBLIC PERMUTATION-BASED PMAC Plus
    Dutta, Avijit
    Nandi, Mridul
    Talnikar, Suprita
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024, 18 (06) : 1842 - 1876
  • [9] Beyond-birthday security for permutation-based Feistel networks
    Chun Guo
    Guoyan Zhang
    Designs, Codes and Cryptography, 2021, 89 : 407 - 440
  • [10] Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation
    Chen, Yu Long
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 : 275 - 304