About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Journal article

The suffix-free-prefix-free hash function construction and its indifferentiability security analysis

From

Shahid Rajaee Teacher Training University1

Department of Mathematics, Technical University of Denmark2

Discrete mathematics, Department of Mathematics, Technical University of Denmark3

In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value $$(IV)$$ of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions.

We propose a generic $$n$$-bit-iterated hash function framework based on an $$n$$-bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary $$IV$$s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO).

We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any $$n$$-bit-iterated hash function based on an $$n$$-bit compression function and with an $$n$$-bit chaining value that is proven indifferentiable from a RO.

Language: English
Publisher: Springer-Verlag
Year: 2012
Pages: 419-434
ISSN: 16155270 and 16155262
Types: Journal article
DOI: 10.1007/s10207-012-0175-4
ORCIDs: Knudsen, Lars R.

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis