DocumentCode :
525321
Title :
A sufficient condition for constructing some XOR-based iterative target collision resistant hash functions
Author :
Li, Lingyun ; Liu, Guangliang ; Xie, Shengxian ; Xue, Lingyan
Author_Institution :
Sch. of Comput. Sci., Liaocheng Univ., Liaocheng, China
Volume :
1
fYear :
2010
fDate :
25-27 June 2010
Abstract :
Most modern hash functions are constructed by iterating a compression function. The XOR-based method put forth by Bellare and Rogaway, and later improved by Shoup, is wildly used to construct target collision resistant hash functions. We consider the relationship between XOR-based target collision resistant hash functions and second preimage resistant compress functions. The contributions of this paper are twofold. First, we present a variant of second preimage resistant property, called CV-SPR. Second, we prove that the CV-SPR property of compress functions suffice to ensure some XOR-based hash functions target resistant to collision. Moreover, we analyze the role of the XOR operation played and why this condition is not suitable for Enveloped Shoup and XTH iterations.
Keywords :
cryptography; file organisation; iterative methods; XOR based iterative target collision resistant hash functions; XTH iterations; compress functions; compression function; Chromium; Computer science; Cryptography; Educational programs; Research and development; Size measurement; Sufficient conditions; XOR; hash; second preimage resistant; target collision resistant;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Design and Applications (ICCDA), 2010 International Conference on
Conference_Location :
Qinhuangdao
Print_ISBN :
978-1-4244-7164-5
Electronic_ISBN :
978-1-4244-7164-5
Type :
conf
DOI :
10.1109/ICCDA.2010.5541201
Filename :
5541201
Link To Document :
بازگشت