Abstract
A common approach for the construction of cryptographic hash functions is to design the algorithm based on an existing symmetric encryption primitive. While there has been extensive research on the design of block cipher-based hash functions, little has been done on the study of design and security of stream cipher-based hash functions (SCH). In this paper we discuss the general construction of stream cipher-based hash functions, devoting special attention to one of the function’s crucial components: the message injection function. We define two types of message injection functions, which may be appended to the keystream generator (e.g. a stream cipher) to build an SCH. Based on these constructions, we evaluate the security of simple SCHs whose stream cipher function consists of a LFSR-based filter generator. We see this as an initial step in the more formal study of the security of hash function constructions based on stream ciphers.
Chapter PDF
References
Aumasson, J.-P., Naya-Plasencia, M.: Cryptanalysis of the MCSSHA Hash Functions (2009), Presented at WEWoRC 2009, http://131002.net/data/papers/AN09.pdf
Black, J., Rogaway, P., Shrimpton, T.: Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320–335. Springer, Heidelberg (2002)
Golić, J.D.: Modes of Operation of Stream Ciphers. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 233–247. Springer, Heidelberg (2001)
Jonsson, J., Widmayer, C., Kelsey, J.: Public Comments on the Draft Federal Information Processing Standard (FIPS) Draft FIPS 180-2, Secure Hash Standard, SHS (2001), http://www.cs.utsa.edu/~wagner/CS4363/SHS/dfips-180-2-comments1.pdf
Maslennikov, M.: Secure hash algorithm MCSSHA-3. Submission to NIST (2008), http://registercsp.nets.co.kr/MCSSHA/MCSSHA-3.pdf
Mendel, F., Nad, T., Schläffer, M.: Collision Attack on Boole. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 369–381. Springer, Heidelberg (2009)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Nakano, Y., Kurihara, J., Kiyomoto, S., Tanaka, T.: On a Construction of Stream-cipher-based Hash Functions. In: SECRYPT, pp. 334–343 (2010)
Nikolić, I., Khovratovich, D.: Second preimage attack on Abacus (2008), http://lj.streamclub.ru/papers/hash/abacus.pdf
NIST. Secure hash standard. FIPS180-1 (1995)
Preneel, B., Govaerts, R., Vandewalle, J.: Hash Functions Based on Block Ciphers: A Synthetic Approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368–378. Springer, Heidelberg (1994)
Rivest, R.: The MD5 message digest algorithm. RFC1321 (1992)
Rose, G.G.: Design and primitive specification for Boole. submission to NIST (2008), http://seer-grog.net/BoolePaper.pdf
Sholer, N.: Abacus a candidate for SHA-3. submission to NIST (2008), http://ehash.iaik.tugraz.at/uploads/b/be/Abacus.pdf
Stam, M.: Blockcipher-Based Hashing Revisited. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 67–83. Springer, Heidelberg (2009)
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)
Wilson, D.: A second-preimage and collision attack on Abacus (2008), http://web.mit.edu/dwilson/www/hash/abacus_attack.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nakano, Y., Cid, C., Fukushima, K., Kiyomoto, S. (2011). Analysis of Message Injection in Stream Cipher-Based Hash Functions. In: Lopez, J., Tsudik, G. (eds) Applied Cryptography and Network Security. ACNS 2011. Lecture Notes in Computer Science, vol 6715. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21554-4_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-21554-4_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21553-7
Online ISBN: 978-3-642-21554-4
eBook Packages: Computer ScienceComputer Science (R0)