Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance

P Rogaway, T Shrimpton - … : 11th International Workshop, FSE 2004, Delhi …, 2004 - Springer
Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi, India …, 2004Springer
We consider basic notions of security for cryptographic hash functions: collision resistance,
preimage resistance, and second-preimage resistance. We give seven different definitions
that correspond to these three underlying ideas, and then we work out all of the implications
and separations among these seven definitions within the concrete-security, provable-
security framework. Because our results are concrete, we can show two types of
implications, conventional and provisional, where the strength of the latter depends on the …
Abstract
We consider basic notions of security for cryptographic hash functions: collision resistance, preimage resistance, and second-preimage resistance. We give seven different definitions that correspond to these three underlying ideas, and then we work out all of the implications and separations among these seven definitions within the concrete-security, provable-security framework. Because our results are concrete, we can show two types of implications, conventional and provisional, where the strength of the latter depends on the amount of compression achieved by the hash function. We also distinguish two types of separations, conditional and unconditional. When constructing counterexamples for our separations, we are careful to preserve specified hash-function domains and ranges; this rules out some pathological counterexamples and makes the separations more meaningful in practice. Four of our definitions are standard while three appear to be new; some of our relations and separations have appeared, others have not. Here we give a modern treatment that acts to catalog, in one place and with carefully-considered nomenclature, the most basic security notions for cryptographic hash functions.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果