140 likes | 254 Views
Domain Extension for Random Oracles: Beyond the Birthday Paradox Bound. Arvind Narayanan (UT Austin) Ilya Mironov (Microsoft Research). Notions of hash function security. RO. multicoll. Pre. aPre. ePre. ?. Sec. aSec. eSec. Nostradamus. CR. ?. TCR. ?. What’s wrong with MD?. M 2.
E N D
Domain Extension for Random Oracles: Beyond the Birthday Paradox Bound ArvindNarayanan (UT Austin) IlyaMironov (Microsoft Research)
Notions of hash function security RO multicoll Pre aPre ePre ? Sec aSec eSec Nostradamus CR ? TCR ?
What’s wrong with MD? M2 M3 M1 h0 h1 h2 h=h3 C C C • Multicollisions (Joux, Crypto’04) • Second preimage (Kelsey and Schneier, Eurocrypt’05) • Nostradamus (Kelsey and Kohno, Eurocrypt’06) Birthday paradox
What does indifferentiability mean? Oracle M1 M2 M3 h0 h1 h2 h=h3 S S S • Maurer at al. • [CDMP05]
Lucks (Asiacrypt2005) Compression function M2 M3 M1 h0 M2 M3 M1 Rate = 0.25 h1 “Finalizing function” • Internal state must be wide (2 x output length) • Optimal security Not exactly impossible
Simple construction M Lucks Double pipe α1α2 β1β2 (only one block shown) M Twice as much space for message bits Linear algebra very fast
Other possibilities M Lucks Double pipe (only one block shown) No internal collisions! Collision resistance 2n on output length 2n
Ugly construction M1 M2 M1 M2 M3 Rate 3/8 Provably behaves like a random oracle (2n)
Proof technique NOT a random oracle! M1 M2 M1 M2 • Hybrid argument fails • Inductive “global” proof • Collision counting M3
The adversary wins if… Goal: distinguish construction from random oracle Collision Does not seem to lead to attack But necessary for using indifferentiability framework Unsupported query
Results • Rate ½ (always) • Collision resistant (2n) • Almost behaves like random oracle (2n) Simple • Rate 3/8 (for SHA-256) • Provably behaves like random oracle (2n) Ugly
Rate comparison Overall rate Merkle-Damgard SHA-256 Ugly Simple Lucks double-pipe Compression ratio 1 2 3 4 5
Why should you care? • Gap between MD and double pipe is large • Factor of 4 for SHA-256, 3 for MD5 • New crop of proof techniques • Steinberger (Eurocrypt’07) • Current work • Shrimpton and Stam (next talk) • Apply techniques to new constructions?
Work in progress • Constructions with better rate • Nontrivial lower bound? • Possibility of getting close to rate 1 • Domain separation • Understand model better, esp. role of unsupported queries • Simpler constructions and proofs