期刊文献+

On the Security of Multivariate Hash Functions 被引量:1

On the Security of Multivariate Hash Functions
原文传递
导出
摘要 Multivariate hash functions are a type of hash functions whose compression function is explicitly defined as a sequence of multivariate equations. Billet et al designed the hash function MQ-HASH and Ding et al proposed a similar construction. In this paper, we analyze the security of multivariate hash functions and conclude that low degree multivariate functions such as MQ-HASH are neither pseudo-random nor unpredictable. There may be trivial collisions and fixed point attacks if the parameters of the compression function have been chosen. And they are also not computation-resistance, which makes MAC forgery easily. Multivariate hash functions axe a type of hash functions whose compression function is explicitly defined as a sequence of multivariate equations.Billet et al designed the hash function MQ-HASH and Ding et al proposed a similar construction.In this paper,we analyze the security of multivariate hash functions and conclude that low degree multivariate functions such as MQ-HASH are neither pseudo-random nor unpredictable.There may be trivial collisions and fixed point attacks if the parameters of the compression function have been chosen. And they are also not computation-resistance,which makes MAC forgery easily.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第2期219-222,共4页 上海交通大学学报(英文版)
基金 the National Natural Science Foundationof China(Nos.60573032,60773092,90604036) the National High Technology Research and Development Program(863)of China(No.2007AA01Z456)
关键词 hash functions MACS MULTIVARIATE 安全散列函数 压缩功能 杂凑函数 伪随机 哈希 传输 攻击
  • 相关文献

参考文献8

  • 1BILLET O,ROBSHAW M,PEYRIN T.On building hash functions from multivariate quadratic equations[].Proc of ACISP.2007
  • 2DING Jintai,YANG Bo-yin.Multivariates polynomials for Hashing[].Proc of Inscrypt.2008
  • 3NAOR M,REINGOLD O.From unpredictability to indistinguishability: A simple construction of pseudo ran-dom functions from MACs(extended abstract)[].Proc of Crypto.1998
  • 4KNUDSEN L.Truncated and higher order differentials[].Proc of FSE.1995
  • 5AUMASSON J P,MEIER W.Analysis of multivariate hash functions[].Proc of ICISC.2007
  • 6PRENEEL B.The state of cryptographic hash functions[].Lectures on Data Security:Modern Cryptology in Theory and Practice.1999
  • 7Bellare M,Rogaway P.Random Oracles are Practical: a Paradigm for Designing Efficient Protocols[].Proceedings of first ACM conference on Computer and Communications Security.1993
  • 8Lai X.Higher order derivatives and diferential cryptanalysis[].Pros Symposium on Communication Coding and Cryptography in honor of J L Massey on the occasion of his ‘th birthday.1994

同被引文献44

  • 1王后珍,张焕国,伍前红,张雨,李春雷,张欣雨.多变量Hash函数的构造理论与方法[J].中国科学:信息科学,2010,40(10):1299-1311. 被引量:4
  • 2JP. Aumasson,L. Henzen,W. Meier, et al.QUARK: A Lightweight Hash. CHES2010 . 2010
  • 3A. Bogdanov,M. Knezevic,G. Leander,D. Toz,K. Varici,I. Verbauwhede.SPONGENT:A lightweight hash function. CHES . 2011
  • 4NAYA-PLASENCIA M,PEYRIN T.Practical cryptanalysis of ARMADILLO2. Fast Software Encryption . 2012
  • 5AO T,HE Z,RAO J,et al.A Compact Hardware Implementation of SM3 Hash Function. Trust,Security and Privacy in Computing and Communications (Trust Com),2014 IEEE 13th International Conference on . 2014
  • 6BERTONI G,DAEMEN J,PEETERS M.The Keccak sponge function family(ON)http://Keccak.noekeon.org/specs_summary.html . 2015
  • 7Martin Hell,Thomas Johansson,Willi Meier.Grain a stream cipher for constrained environments. International Journal of Wireless and Mobile Computing . 2007
  • 8DINUR I,DUNKELMAN O,SHAMIR A.Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Fast Software Encryption . 2013
  • 9KUILA S,SAHA D,Pal M,et al.Practical distinguishers against 6-round keccak-f exploiting self-symmetry. Progress in Cryptology-AFRICACRYPT 2014 . 2014
  • 10AUMASSON J P,MEIER W.Analysis of multivariate hash functions. Information Security and Cryptology-ICISC 2007 . 2007

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部