Provable Security Analysis of SHA-3 Candidates

نویسندگان

  • Marjan Škrobot
  • Elena Andreeva
  • Bart Mennink
چکیده

Hash functions are fundamental cryptographic primitives that compress messages of arbitrary length into message digests of a fixed length. They are used as the building block in many important security applications such as digital signatures, message authentication codes, password protection, etc. The three main security properties of hash functions are collision, second preimage and preimage resistance. In 2005, significant breakthrough was made in the cryptanalysis of hash functions. Namely, attacks on SHA-1 and MD5 raised concerns about the security of the widely used hash function standards. In a response to this hash function crisis, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in 2007. NIST received 64 submissions. At this moment, 5 candidates are in the final round of competition: BLAKE, Grøstl, JH, Keccak and Skein. An important criteria for the evaluation of hash functions is their security. A common technique to assess the security of hash functions is via reductionist proofs of security. Within this provable framework, Andreeva et al. provided a summary of all known security reduction results in the ideal model for the 14 second round SHA-3 candidates. Furthermore, they identified several open problems. In this thesis, we investigate the existing proof techniques for the second preimage analysis and resolve remaining open problems regarding the second preimage resistance of Grøstl and Skein. More precisely, these two hash functions are proved optimally second preimage resistant in the ideal model within the concrete security provable framework. Finally, we provide an overview of the current security reduction and performance results on the five finalists.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein

In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to the vulnerabilities identified in widely employed hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. At present, 5 candidates are left in the third round of the competition. An import...

متن کامل

Security Reductions of the Second Round SHA-3 Candidates

In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. At present, 14 candidates are left in the second round. An important criterion in the selecti...

متن کامل

Indifferentiability of the Hash Algorithm BLAKE

The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In this paper, we provide the indifferentiable security proof on BLAKE with the bound O( σ 2 2n−3 ), where σ is the total number of blocks of queries, and n is the hash output size.

متن کامل

Cayley Hashes: A Class of Efficient Graph-based Hash Functions

Hash functions are widely used in cryptography. Recent breakthroughs against the standard SHA-1 prompted NIST to launch a competition for a new secure hash algorithm, SHA-3 [1]. Provably secure hash functions, that is functions whose security reduces to a simply-stated, supposedly hard mathematical problem, are widely believed to be much too slow for the NIST competition. In this paper, we disc...

متن کامل

Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures

The NIST hash function competition to design a new cryptographic hash standard ‘SHA-3’ is currently one of the hot topics in cryptologic research, its outcome heavily depends on the public evaluation of the remaining 14 candidates. There have been several cryptanalytic efforts to evaluate the security of these hash functions. Concurrently, invaluable benchmarking efforts have been made to measu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012