Paper 2005/443

Revised: Block Cipher Based Hash Function Construction From PGV

Duo Lei

Abstract

Preneel, Govaerts, and Vandewalle[12] considered the 64 most basic ways to construct a hash function from a block cipher, and regarded 12 of these 64 schemes as secure. Black, Pogaway and Shrimpton[3] proved that, in black-box model, the 12 schemes that PGV singled out as secure really are secure and given tight upper and lower bounds on their collision resistance. And also they pointed out, by stepping outside of the Merkle-Damgard[5] approach to analysis, an additional 8 of the 64 schemes are just as collision resistant as the first group of schemes. In this paper we point out that the 12 compression functions that PGV singled out are free start collision resistant and others are not, the additional 8 compression functions are only fix start collision resistant as singled out by BRS, the hash functions based on those 20 schemes are fix start collision resistant, the upper bound of collision resistance and preimage resistant are given based on conditional probability of compression function, not based on assumption of random oracle model, the bounds have more practical value than the bounds given by BRS. In view point of collision resistant, the best 4 schemes are not among the 12 schemes singled by PGV, and among the 8 schemes point out by BRS, and block cipher E itself is the best compression to build a collision resistant hash function. At the end of the paper, two recommend structure of block cipher based hash function are given, and a prove of their securities are also given.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
Block cipherHash FunctionFeistel structure
Contact author(s)
Duoduolei @ gmail com
History
2006-08-12: last of 4 revisions
2005-12-07: received
See all versions
Short URL
https://ia.cr/2005/443
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/443,
      author = {Duo Lei},
      title = {Revised: Block Cipher Based Hash Function Construction From {PGV}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2005/443},
      year = {2005},
      url = {https://eprint.iacr.org/2005/443}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.