Paper 2008/527

Properties of Cryptographic Hash Functions

Michal Rjaško

Abstract

This paper extends the work of Rogaway and Shrimpton (2004), where they formalized seven security properties: notions of preimage resistance (Pre, aPre, ePre), second-preimage resistance (Sec, aSec, eSec) and collision resistance (Coll). They also give all the implications and separations among the properties. In this paper we consider three additional security properties which are important in applications of hash functions: unforgeability (MAC), pseudo-random function (Prf) and pseudo-random oracle (Pro). We give a new type of the implication and separation between the security notions since the ones defined by Rogaway and Shrimpton were too constraining, and work out all the relationships among the ten security notions above. Some of the relations have been proven before, some of them appear to be new. We show that a property pseudo-random oracle (Pro) introduced by Coron, Dodis, Malinaud and Puniya is (as expected) the strongest one, since it implies almost all of the other properties.

Metadata
Available format(s)
PDF PS
Publication info
Published elsewhere. Appeared in Mikulášska Kryptobesídka (MKB 2008), Prague
Keywords
cryptographic hash functionprovable securityproperties of hash functions
Contact author(s)
rjasko @ dcs fmph uniba sk
History
2008-12-19: received
Short URL
https://ia.cr/2008/527
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/527,
      author = {Michal Rjaško},
      title = {Properties of Cryptographic Hash Functions},
      howpublished = {Cryptology {ePrint} Archive, Paper 2008/527},
      year = {2008},
      url = {https://eprint.iacr.org/2008/527}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.