Cryptology ePrint Archive: Report 2008/110

On the Design of Secure and Fast Double Block Length Hash Functions

Zheng Gong and Xuejia Lai and Kefei Chen

Abstract: In this work the security of double block length hash functions with rate 1, which are based on a block cipher with a block length of $n$ bits and a key length of $2n$ bits, is reconsidered. Counter-examples and new attacks are presented on this general class of fast double block length hash functions, which reveal unnoticed flaws in the necessary conditions given by Satoh \textit{et al.} and Hirose. Preimage and second preimage attacks are presented on Hirose's two examples which were left as an open problem. Our synthetic analysis show that all rate-1 hash functions in FDBL-II are failed to be optimally (second) preimage resistant. The necessary conditions are refined for ensuring a subclass of hash functions in FDBL-II to be optimally secure against collision attacks. In particular, one of Hirose's two examples, which satisfies our refined conditions, is proven to be indifferentiable from a random oracle in the ideal cipher model. The security results are extended to a new class of double block length hash functions with rate 1, where the key length of one block cipher used in the compression function is equal to the block length, whereas the other is doubled.

Category / Keywords: Cryptanalysis, Block-cipher-based hash function, Double block length, Indifferentiability.

Date: received 12 Mar 2008, last revised 18 Jun 2009, withdrawn 15 Mar 2012

Contact author: cis gong at gmail com

Available format(s): (-- withdrawn --)

Note: Refined Abstract

Version: 20120316:053850 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]