ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS

Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka

2010

Abstract

Hash functions using stream ciphers as components perform fast on a variety of platforms. However, the security and the design policy of stream-cipher-based hash functions (SCHs) have not yet been studied sufficiently. In this paper, we analyze its design criteria based on a ideal function of SCHs. First, we show that attacks against a stream cipher can also be threats against SCHs. Then we discuss the security on each phase of SCH; message injection, blank rounds, and hash generation with this function. Finally we derive the necessary conditions on the stream cipher function for an SCH to be secure.

References

  1. Biham, E. and Seberry, J. (2005). Py : A Fast and Secure Stream Cipher using Rolling Arrays. eSTREAM, ECRYPT Stream Cipher Project.
  2. Biham, E. and Seberry, J. (2006). Pypy: Another Version of Py. eSTREAM, ECRYPT Stream Cipher Project.
  3. Bleichenbacher, D. and Patel, S. (1999). Sober crytanalysis. In Knudsen, L. R., editor, FSE, volume 1636 of LNCS, pages 305-316. Springer.
  4. Coppersmith, D., Halevi, S., and Jutla, C. S. (2002). Cryptanalysis of stream ciphers with linear masking. In Yung, M., editor, CRYPTO, volume 2442 of LNCS, pages 515-532. Springer.
  5. Ekdahl, P. and Johansson, T. (2002). A New Version of the Stream Cipher SNOW. In Nyberg, K. and Heys, H. M., editors, SAC, volume 2595 of LNCS, pages 47- 61. Springer.
  6. Golic, J. D. (2001). Modes of Operation of Stream Ciphers. In Stinson, D. R. and Tavares, S. E., editors, SAC, volume 2012 of LNCS, pages 233-247. Springer.
  7. Hawkes, P. and Rose, G. G. (2002). Guess-and-Determine Attacks on SNOW. In Nyberg, K. and Heys, H. M., editors, SAC, volume 2595 of LNCS, pages 37-46. Springer.
  8. Joux, A. (2004). Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In Franklin, M. K., editor, CRYPTO, volume 3152 of LNCS, pages 306-316. Springer.
  9. Joux, A. and Muller, F. (2003). Loosening the KNOT. In Johansson, T., editor, FSE, volume 2887 of LNCS, pages 87-99. Springer.
  10. Joux, A. and Muller, F. (2006). Chosen-Ciphertext Attacks Against MOSQUITO. In Robshaw, M. J. B., editor, FSE, volume 4047 of LNCS, pages 390-404. Springer.
  11. Meier, W. and Staffelbach, O. (1988). Fast Correlation Attacks on Stream Ciphers. In EUROCRYPT, volume 330 of LNCS, pages 301-314. Springer.
  12. Mendel, F., Nad, T., and Schläffer, M. (2009). Collision Attack on Boole. In Abdalla, M., Pointcheval, D., Fouque, P.-A., and Vergnaud, D., editors, ACNS, volume 5536 of LNCS, pages 369-381.
  13. Menezes, A. J., van Oorschot, P. C., and Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.
  14. Nikolic, I. (2008). Preimage attack on Boolen. The ECRYPT Hash Function Website, http://ehash.iaik.tugraz.at/uploads/2/2f/Boole.pdf
  15. Nikolic, I. and Khovratovich, D. (2008). Second preimage attack on Abacus. available online, http://lj.streamclub.ru/papers/hash/abacus.pdf
  16. NIST (1995). Secure hash standard. FIPS180-1.
  17. Rivest, R. (1992). The MD5 message digest algorithm. RFC1321.
  18. Rose, G. G. (2008). Design and primitive specification for Boole. submission to NIST, http://seergrog.net/BoolePaper.pdf
  19. Sholer, N. (2008). Abacus a candidate for SHA-3. submission to NIST, http://ehash.iaik.tugraz.at/uploads/b/be/Abacus.pdf
  20. Wang, X., Yin, Y. L., and Yu, H. (2005). Finding collisions in the full SHA-1. In Shoup, V., editor, CRYPTO, volume 3621 of LNCS, pages 17-36. Springer.
  21. Wang, X. and Yu, H. (2005). How to break MD5 and Other Hash Functions. In Cramer, R., editor, EUROCRYPT, volume 3494 of LNCS, pages 19-35. Springer.
  22. Wilson, D. (2008). A second-preimage and collision attack on Abacus. available online, http://web.mit.edu/dwilson/www/hash/abacus attack. pdf
  23. Wu, H. and Preneel, B. (2007). Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. In Naor, M., editor, EUROCRYPT, volume 4515 of LNCS, pages 276-290. Springer.
Download


Paper Citation


in Harvard Style

Nakano Y., Kurihara J., Kiyomoto S. and Tanaka T. (2010). ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 334-343. DOI: 10.5220/0002939703340343


in Bibtex Style

@conference{secrypt10,
author={Yuto Nakano and Jun Kurihara and Shinsaku Kiyomoto and Toshiaki Tanaka},
title={ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={334-343},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002939703340343},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS
SN - 978-989-8425-18-8
AU - Nakano Y.
AU - Kurihara J.
AU - Kiyomoto S.
AU - Tanaka T.
PY - 2010
SP - 334
EP - 343
DO - 10.5220/0002939703340343