Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
نویسندگان
چکیده
In a recent note to the NIST hash-forum list, the following observation was presented: narrow-pipe hash functions differ significantly from ideal random functions H : {0, 1} → {0, 1} that map bit strings from a big domain where N = n + m, m ≥ n (n = 256 or n = 512). Namely, for an ideal random function with a big domain space {0, 1} and a finite co-domain space Y = {0, 1}, for every element y ∈ Y , the probability Pr{H−1(y) = ∅} ≈ e−2 m ≈ 0 where H−1(y) ⊆ {0, 1} and H−1(y) = {x | H(x) = y} (in words the probability that elements of Y are “unreachable” is negligible). However, for the narrow-pipe hash functions, for certain values of N (the values that are causing the last padded block that is processed by the compression function of these functions to have no message bits), there exists a huge non-empty subset Y∅ ⊆ Y with a volume |Y∅| ≈ e−1|Y | ≈ 0.36|Y | for which it is true that for every y ∈ Y∅, H−1(y) = ∅. In this paper we extend the same finding to SHA-2 and show consequences of this abberation when narrow-pipe hash functions are employed in HMAC and in two widely used protocols: 1. The pseudorandom function defined in SSL/TLS 1.2 and 2. The Password-based Key Derivation Function No.1, i.e. PBKDF1.
منابع مشابه
Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions?
In the last 7-8 months me and Klima have discovered several deficiencies of narrow-pipe cryptographic hash designs. It all started with a note to the hash-forum list that narrow-pipe hash functions are giving outputs that are pretty different than the output that we would expect from a random oracle that is mapping messages of arbitrary length to hash values of n-bits. Then together with Klima ...
متن کاملGeneric Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates
In this note we show a consequence of the recent observation that narrow-pipe hash designs manifest an abberation from ideal random functions for finding collisions for those functions with complexities much lower than the so called generic birthday paradox lower bound. The problem is generic for narrow-pipe designs including classic Merkle-Damg̊ard designs but also recent narrow-pipe SHA-3 cand...
متن کاملNarrow-pipe SHA-3 candidates differ significantly from ideal random functions defined over big domains
In the SHA-3 competition 4 candidates in the second round are narrow-pipe designs. Those are: BLAKE, Hamsi, SHAvite-3 and Skein. In this paper we show that there exist many concrete cases when these functions differ significantly from ideal random functions H : {0, 1}N → {0, 1}n that map bit strings from a big domain where N = n + m, m ≥ n (n = 256 or n = 512). Our observation is simple: For an...
متن کاملProvable Chosen-Target-Forced-Midfix Preimage Resistance
This paper deals with definitional aspects of the herding attack of Kelsey and Kohno, and investigates the provable security of several hash functions against herding attacks. Firstly, we define the notion of chosen-target-forced-midfix (CTFM) as a generalization of the classical herding (chosen-target-forced-prefix) attack to the cases where the challenge message is not only a prefix but may a...
متن کاملActive Domain Expansion for Normal Narrow-pipe Hash Functions
Recently several reports of Cryptology ePrint Archive showed the discovering that for a normal iterative hash function the entropy and codomain would reduce greatly,then some conclusions were given: Narrow-pipe hash functions couldn’t resist this reducing (But wide-pipe hash functions could.),and generic collision attacks on narrow-pipe hash functions would be faster than birthday paradox.The d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2010 شماره
صفحات -
تاریخ انتشار 2010