Security/efficiency tradeoffs for permutation-based hashing

被引:0
|
作者
Rogaway, Phillip [1 ]
Steinberger, John [2 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[2] Univ British Columbia, Dept Math, Vancouver, BC V5Z 1M9, Canada
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008 | 2008年 / 4965卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We provide attacks and analysis that capture a tradeoff, in the ideal-permutation model, between the speed of a permutation-based hash function and its potential security. We show that any 2n-bit to n-bit compression function will have unacceptable collision resistance it makes fewer than three n-bit permutation invocations, and any 3n-bit to 2n-bit compression function will have unacceptable security if it makes fewer than five n-bit permutation invocations. Any rate-a hash function built from n-bit permutations can be broken, in the sense of finding preimages as well as collisions, in about N1-alpha queries, where N = 2(n). Our results provide guidance when trying to design or analyze a permutation-based hash function about the limits of what can possibly be done.
引用
收藏
页码:220 / +
页数:4
相关论文
共 50 条
  • [21] A Permutation-based Code for the Wiretap Channel
    Kang, Wei
    Liu, Nan
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2306 - 2310
  • [22] The query complexity of a permutation-based variant of Mastermind
    Afshani, Peyman
    Agrawal, Manindra
    Doerr, Benjamin
    Doerr, Carola
    Larsen, Kasper Green
    Mehlhorn, Kurt
    DISCRETE APPLIED MATHEMATICS, 2019, 260 : 28 - 50
  • [23] Farasha: A Provable Permutation-Based Parallelizable PRF
    Aaraj, Najwa
    Bellini, Emanuele
    Jejurikar, Ravindra
    Manzano, Marc
    Rohit, Raghvendra
    Salazar, Eugenio
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 437 - 458
  • [24] A permutation-based estimator for monotone index models
    Bhattacharya, Debopam
    ECONOMETRIC THEORY, 2008, 24 (03) : 795 - 807
  • [25] Employing GPU architectures for permutation-based indexing
    Krulis, Martin
    Osipyan, Hasmik
    Marchand-Maillet, Stephane
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (09) : 11859 - 11887
  • [26] RFID security:: Tradeoffs between security and efficiency
    Damgard, Ivan
    Pedersen, Michael Ostergaard
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 318 - 332
  • [27] A Permutation-Based Kernel Conditional Independence Test
    Doran, Gary
    Muandet, Krikamol
    Zhang, Kun
    Scholkoepf, Bernhard
    UNCERTAINTY IN ARTIFICIAL INTELLIGENCE, 2014, : 132 - 141
  • [28] Runtime Analysis for Permutation-based Evolutionary Algorithms
    Benjamin Doerr
    Yassine Ghannane
    Marouane Ibn Brahim
    Algorithmica, 2024, 86 : 90 - 129
  • [29] Population diversity in permutation-based genetic algorithm
    Zhu, KQ
    Liu, ZW
    MACHINE LEARNING: ECML 2004, PROCEEDINGS, 2004, 3201 : 537 - 547
  • [30] A fast permutation-based algorithm for block clustering
    I. Llatas
    A. J. Quiroz
    J. M. Renóm
    Test, 1997, 6 : 397 - 418