The relations between preimage awareness and some other cryptographic properties of hash functions
DOI:
https://doi.org/10.54654/isj.v1i13.128Keywords:
Pseudo-random oracle, preimage awareness, weak preimage awareness, bounded preimage awarenessTóm tắt
Abstract— Randomness tests related to overlapping template matching have been proposed in NIST SP 800-22 [1], however the probabilities in these tests are only valid for specific samples and should be recalculated for other samples. In [2], the authors proposed new template matching tests for all 4-bit templates. The new tests can be applied to any sequence of minimum length of 5504 bits whereas the overlapping template matching test in the NIST test suite can only be applied to sequences of minimum length of 106 bits. In this paper, we have modified and proposed new 4-bit template matching tests that can be applied to any sequence of minimum length 3726 bits. Furthermore, we proposed three new 5-bit template matching tests. Our theoretical and practical results show that our new proposed tests are very efficient in psedorandom number generator testing.
Downloads
References
Dodis, Y., T. Ristenpart, and T. Shrimpton. Salvaging Merkle-Damgård for practical applications. in Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2009. Springer.
Maurer, U., R. Renner, and C. Holenstein. Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. in Theory of cryptography conference. 2004. Springer.
Coron, J.-S., et al. Merkle-Damgård revisited: How to construct a hash function. in Annual International Cryptology Conference. 2005. Springer.
Buldas, A. and R. Laanoja. Security proofs for hash tree time-stamping using hash functions with small output size. in Australasian Conference on Information Security and Privacy. 2013. Springer.
Buldas, A., et al. Bounded pre-image awareness and the security of hash-tree keyless signatures. in International Conference on Provable Security. 2014. Springer.
Buldas, A., R. Laanoja, and A. Truu, Security Proofs for the BLT Signature Scheme. IACR Cryptol. ePrint Arch., 2014. 2014: p. 696.
Guido, B., et al., Cryptographic sponge functions. 2011.
Седов, Г.К., Стойкость ГОСТ Р 34.11-2012 к атаке поиска прообраза и к атаке поиска коллизий. Математические вопросы криптографии, 2015. 6(2): p. 79-98.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).