Security-amplifying combiners for collision-resistant hash functions

17Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The classical combiner CombclassHO,H1(M) = H O(M)∥ H1(M) for hash functions H0, H 1 provides collision-resistance as long as at least one of the two underlying hash functions is secure. This statement is complemented by the multi-collision attack of Joux (Crypto 2004) for iterated hash functions H 0, H1 with n-bit outputs. He shows that one can break the classical combiner in n/2 · T0 + T1 steps if one can find collisions for H0 and H1 in time T0 and T1, respectively. Here we address the question if there are security-amplifying combiners where the security of the building blocks increases the security of the combined hash function, thus beating the bound of Joux. We discuss that one can indeed have such combiners and, somewhat surprisingly in light of results of Nandi and Stinson (ePrint 2004) and of Hoch and Shamir (FSE 2006), our solution is essentially as efficient as the classical combiner. © International Association for Cryptologic Researcn 2007.

Cite

CITATION STYLE

APA

Fischlin, M., & Lehmann, A. (2007). Security-amplifying combiners for collision-resistant hash functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4622 LNCS, pp. 224–243). Springer Verlag. https://doi.org/10.1007/978-3-540-74143-5_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free