18.97.9.169
18.97.9.169
close menu
Candidate SCOPUS
Invited Paper : Security Properties of Domain Extenders for Cryptographic Hash Functions
( Elena Andreeva ) , ( Bart Mennink ) , ( Bart Preneel )
UCI I410-ECN-0102-2012-000-001841157

Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most common procedure to extend the domain of a compression function in order to obtain a hash function is a simple linear iteration; however, some variants use multiple iterations or a tree structure that allows for parallelism. This paper presents a survey of 17 extenders in the literature. It considers the natural question whether these preserve the security properties of the compression function, and more in particular collision resistance, second preimage resistance, preimage resistance and the pseudo-random oracle property.

[자료제공 : 네이버학술정보]
×