Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. An Analysis of the Blockcipher-Based Hash Functions from PGV
 
research article

An Analysis of the Blockcipher-Based Hash Functions from PGV

Black, J.
•
Rogaway, P.
•
Shrimpton, T.
Show more
2010
Journal Of Cryptology

Preneel, Govaerts, and Vandewalle (1993) considered the 64 most basic ways to construct a hash function H: {0, 1}*->{0, 1}(n) from a blockcipher E: {0, 1}(n) x {0, 1}(n)->{0,1}(n). They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. Here we provide a proof-based treatment of the PGV schemes. We show that, in the ideal-cipher model, the 12 schemes considered secure by PGV really are secure: we give tight upper and lower bounds on their collision resistance. Furthermore, by stepping outside of the Merkle-Damgard approach to analysis, we show that an additional 8 of the PGV schemes are just as collision resistant (up to a constant). Nonetheless, we are able to differentiate among the 20 collision-resistant schemes by considering their preimage resistance: only the 12 initial schemes enjoy optimal preimage resistance. Our work demonstrates that proving ideal-cipher-model bounds is a feasible and useful step for understanding the security of blockcipher-based hash-function constructions.

  • Files
  • Details
  • Metrics
Type
research article
DOI
10.1007/s00145-010-9071-0
Web of Science ID

WOS:000281382800002

Author(s)
Black, J.
Rogaway, P.
Shrimpton, T.
Stam, Martijn  
Date Issued

2010

Publisher

Springer Verlag

Published in
Journal Of Cryptology
Volume

23

Start page

519

End page

545

Subjects

Blockcipher

•

Collision-resistant hash function

•

Cryptographic hash function

•

Ideal-cipher model

•

Modes of operation

•

Ideal-Cipher Model

•

Security/Efficiency Tradeoffs

•

Collision Resistance

•

Merkle-Damgard

•

Block Ciphers

•

Security

•

Impossibility

•

Indifferentiability

•

Code

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LACAL  
Available on Infoscience
December 16, 2011
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/75225
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés