Stam's Conjecture and Threshold Phenomena in Collision Resistance

نویسندگان

  • John P. Steinberger
  • Xiaoming Sun
  • Zhe Yang
چکیده

At CRYPTO 2008 Stam [8] conjectured that if an (m+s)-bit to s-bit compression function F makes r calls to a primitive f of n-bit input, then a collision for F can be obtained (with high probability) using r2 queries to f , which is sometimes less than the birthday bound. Steinberger [9] proved Stam’s conjecture up to a constant multiplicative factor for most cases in which r = 1 and for certain other cases that reduce to the case r = 1. In this paper we prove the general case of Stam’s conjecture (also up to a constant multiplicative factor). Our result is qualitatively different from Steinberger’s, moreover, as we show the following novel threshold phenomenon: that exponentially many (more exactly, 2) collisions are obtained with high probability after O(1)r2 queries. This in particular shows that threshold phenomena observed in practical compression functions such as JH are, in fact, unavoidable for compression functions with those parameters.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stam's Collision Resistance Conjecture

At CRYPTO 2008 Stam [7] made the following conjecture: if an m + s-bit to s-bit compression function F makes r calls to a primitive f of n-bit input, then a collision for F can be obtained (with high probability) using r2 queries to f . For example, a 2n-bit to n-bit compression function making two calls to a random function of n-bit input cannot have collision security exceeding 2. We prove th...

متن کامل

Identification of Hazardous Situations using Kernel Density Estimation Method Based on Time to Collision, Case study: Left-turn on Unsignalized Intersection

The first step in improving traffic safety is identifying hazardous situations. Based on traffic accidents’ data, identifying hazardous situations in roads and the network is possible. However, in small areas such as intersections, especially in maneuvers resolution, identifying hazardous situations is impossible using accident’s data. In this paper, time-to-collision (TTC) as a traffic conflic...

متن کامل

Fluid description of collisional current filamentation instability of a weakly ionized plasma in the presence of magnetic field

In this paper, the collisional filamentation instability of an electron beam-weakly magnetized and ionized plasma has been investigated in the presence of background plasma, using the fluid description. By describing the equilibrium configuration in the presence of binary collision terms between charged and neutral particles and using the local approximation method, the dispersion relation (DR)...

متن کامل

Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?

It has been known for quite some time that collision-resistance of hash functions does not seem to give any actual security guarantees for unbounded hash-tree time-stamping, where the size of the hash-tree created by the timestamping service is not explicitly restricted. We focus on the possibility of showing that there exist no black-box reductions of unbounded time-stamping schemes to collisi...

متن کامل

Calculation of Collision Speed Corresponded to Maximum Penetration Using Hydrodynamic Theory

One of the most valid and efficient models of long rod projectile penetration in homogeneous targets is Tate and Alekseevskii’s (A&t) model. Based on Tate’s model, the present research tries to calculate the optimum speeds to achieve the maximum penetration depth in the homogeneous targets. The proposed collision speed-penetration depth diagrams are developed using Tate’s model. In this way, va...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012