On the impossibility of highly-efficient blockcipher-based hash functions

7Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.

Abstract

Fix a small nonempty set of blockcipher keys \mathcal{K} . We say a blockcipher-based hash function is highly-efficient if it makes exactly one blockcipher call for each message block hashed, and all blockcipher calls use a key from \mathcal{K} . Although a few highly-efficient constructions have been proposed, no one has been able to prove their security. In this paper we prove, in the ideal-cipher model, that it is impossible to construct a highly-efficient iterated blockcipher-based hash function that is provably secure. Our result implies, in particular, that the Tweakable Chain Hash (TCH) construction suggested by Liskov, Rivest, and Wagner (Advances in Cryptology-CRYPTO '02, Lecture Notes in Computer Science, vol. 2442, pp. 31-46, Springer, Berlin, 2002) is not correct under an instantiation suggested for this construction, nor can TCH be correctly instantiated by any other efficient means. © 2008 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Black, J., Cochran, M., & Shrimpton, T. (2009). On the impossibility of highly-efficient blockcipher-based hash functions. Journal of Cryptology, 22(3), 311–329. https://doi.org/10.1007/s00145-008-9030-1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free