Abstract
The classical combiner CombclassHO,H1(M) = H O(M)∥ H1(M) for hash functions H0, H 1 provides collision-resistance as long as at least one of the two underlying hash functions is secure. This statement is complemented by the multi-collision attack of Joux (Crypto 2004) for iterated hash functions H 0, H1 with n-bit outputs. He shows that one can break the classical combiner in n/2 · T0 + T1 steps if one can find collisions for H0 and H1 in time T0 and T1, respectively. Here we address the question if there are security-amplifying combiners where the security of the building blocks increases the security of the combined hash function, thus beating the bound of Joux. We discuss that one can indeed have such combiners and, somewhat surprisingly in light of results of Nandi and Stinson (ePrint 2004) and of Hoch and Shamir (FSE 2006), our solution is essentially as efficient as the classical combiner. © International Association for Cryptologic Researcn 2007.
Cite
CITATION STYLE
Fischlin, M., & Lehmann, A. (2007). Security-amplifying combiners for collision-resistant hash functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4622 LNCS, pp. 224–243). Springer Verlag. https://doi.org/10.1007/978-3-540-74143-5_13
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.