About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Journal article

On security arguments of the second round SHA-3 candidates

From

Stichting Katholieke Universiteit1

Department of Mathematics, Technical University of Denmark2

Discrete mathematics, Department of Mathematics, Technical University of Denmark3

In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. 14 candidates were left in the second round, out of which five candidates have been recently chosen for the final round.

An important criterion in the selection process is the SHA-3 hash function security. We identify two important classes of security arguments for the new designs: (1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments against differential attack on building blocks.

In this paper, we compare the state of the art provable security reductions for the second round candidates and review arguments and bounds against classes of differential attacks.We discuss all the SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential attacks.

Additionally, we generalize the well-known proof of collision resistance preservation, such that all SHA-3 candidates with a suffix-free padding are covered.

Language: English
Publisher: Springer-Verlag
Year: 2012
Pages: 103-120
ISSN: 16155270 and 16155262
Types: Journal article
DOI: 10.1007/s10207-012-0156-7
ORCIDs: Bogdanov, Andrey

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis