Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ https://link.springe...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
https://link.springer.com/cont...
Part of book or chapter of book
Data sources: UnpayWall
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
Journal of Cryptology
Article . 2008 . Peer-reviewed
License: Springer TDM
Data sources: Crossref
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
zbMATH Open
Article . 2009
Data sources: zbMATH Open
https://doi.org/10.1007/114266...
Part of book or chapter of book . 2005 . Peer-reviewed
Data sources: Crossref
DBLP
Article
Data sources: DBLP
DBLP
Conference object
Data sources: DBLP
DBLP
Article
Data sources: DBLP
DBLP
Article
Data sources: DBLP
versions View all 7 versions
addClaim

On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions

On the impossibility of highly-efficient blockcipher-based hash functions
Authors: John Black; Martin Cochran; Thomas Shrimpton;

On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions

Abstract

The authors investigate the idea of building hash functions from blockciphers. During the years various schemes have been proposed. Although some of them are provably secure they are viewed as inefficient since the blockcipher key has to be changed each round. For the conventional blockciphers this key change is undesirable since scheduling a new key entails a significant computational cost. In the focus of this work, the authors put the question of whether it is possible to achieve provable security without incurring this cost. Fix a small nonempty set of blockcipher keys \(\mathcal{K}\). A blockcipher-based hash function is said to be highly-efficient if it makes exactly one blockcipher call for each message block hashed, and all blockcipher calls use a key from \(\mathcal{K}\). During the years a few highly-efficient constructions have been proposed, but no one has been able to prove their security. In the present paper the authors prove that in the ideal-cipher model it is impossible to construct a highly-efficient iterated blockcipher-based hash function that is provably secure. This result implies, in particular, that the TWeakable Chain Hash construction suggested by \textit{M. Liskov, R. L. Rivest}, and \textit{D. Wagner} [Lect. Notes Comput. Sci. 2442, 31--46 (2002; Zbl 1026.94533)] is not correct under an instantiation suggested for this construction nor can TCH be correctly instantiated by any other efficient means.

Keywords

blockcipher-based hash functions, collision-resistant hash fuctions, tweakable blockciphers, Cryptography, provable security, Authentication, digital signatures and secret sharing, ideal cipher model

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    56
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Top 10%
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
56
Top 10%
Top 10%
Top 10%
bronze