Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier

Show simple item record

dc.contributor.author Moody, Dustin
dc.contributor.author Paul, Souradyuti
dc.contributor.author Smith-Tone, Daniel
dc.date.accessioned 2016-05-21T12:08:54Z
dc.date.available 2016-05-21T12:08:54Z
dc.date.issued 2016-04
dc.identifier.citation Moody, Dustin; Paul, Souradyuti and Smith-Tone, Daniel, “Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier”, Journal of Mathematical Cryptology, DOI: 10.1515/jmc-2014-0044, vol. 10, no. 2, Jan. 2016.
dc.identifier.issn 1862-2976
dc.identifier.uri http://dx.doi.org/10.1515/jmc-2014-0044
dc.identifier.uri https://repository.iitgn.ac.in/handle/123456789/2261
dc.description.abstract A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaningful generic attacks. Such hash functions also play a crucial role in establishing the security of protocols that use them as random functions. To eliminate multi-collision type attacks on the Merkle–Damgård mode (Crypto 1989), Lucks proposed widening the size of the internal state of hash functions (Asiacrypt 2005). The fast wide pipe (FWP) hash mode was introduced by Nandi and Paul at Indocrypt 2010, as a faster variant of Lucks' wide pipe mode. Despite the higher speed, the proven indifferentiability bound of the FWP mode has so far been only up to the birthday barrier of n/2 bits. The main result of this paper is the improvement of the FWP bound to 2n/3 bits (up to an additive constant). We also provide evidence that the bound may be extended beyond 2n/3 bits. en_US
dc.description.statementofresponsibility by Dustin Moody, Souradyuti Paul and Daniel Smith-Tone
dc.format.extent vol. 10, no. 2
dc.language.iso en en_US
dc.publisher De Gruyter en_US
dc.subject Indifferentiability en_US
dc.subject Birthday barrier en_US
dc.subject Fast wide pipe en_US
dc.title Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier en_US
dc.type Article en_US
dc.relation.journal Journal of Mathematical Cryptology


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account