Security Reductions of the Second Round SHA-3 Candidates

Security Reductions of the Second Round SHA-3 Candidates

Security Reductions of the Second Round SHA-3 Candidates Bart Mennink (K.U.Leuven) Joint work with: Elena Andreeva and Bart Preneel (K.U.Leuven) Information Security Conference Florida, USA October 26, 2010 1 / 17 Overview 1 NIST's SHA-3 Hash Function Competition 2 Security Notions of Hash Functions 3 Classication of Security Reductions 4 Conclusions 2 / 17 - - SHA-3 must be ecient and secure NIST's SHA-3 Hash Function Competition 2004: Attacks by Wang et al. exposed vulnerabilities in several widely employed hash functions (incl. MD5 and SHA-1) 2007: US NIST launched a public competition for the design of a new hash function: SHA-3 Dec 2008: NIST announced 51 rst round candidates Jul 2009: NIST announced 14 second round candidates End of 2010: NIST will announce4-6 nalists ± 2012: NIST will announce new hash function 3 / 17 - - NIST's SHA-3 Hash Function Competition 2004: Attacks by Wang et al. exposed vulnerabilities in several widely employed hash functions (incl. MD5 and SHA-1) 2007: US NIST launched a public competition for the design of a new hash function: SHA-3 Dec 2008: NIST announced 51 rst round candidates Jul 2009: NIST announced 14 second round candidates End of 2010: NIST will announce4-6 nalists ± 2012: NIST will announce new hash function SHA-3 must be ecient and secure 3 / 17 (vii) Additionally, we analyze the indierentiability NIST's Security Requirements Hash function must provide message digests of 224; 256; 384 and 512 bits (i) At least one variant must support HMAC and randomized hashing For all n-bit digest values, the hash function must provide (ii) preimage resistance (iii) second preimage resistance (iv) collision resistance (v) resistance to the length-extension attack (vi) For any m ≤ n, the hash function specied by taking a xed subset of m bits of the function's output is required to satisfy properties (ii)-(v) with n replaced by m 4 / 17 (vii) Additionally, we analyze the indierentiability NIST's Security Requirements Hash function must provide message digests of 224; 256; 384 and 512 bits (i) At least one variant must support HMAC and randomized hashing For all n-bit digest values, the hash function must provide (ii) preimage resistance (iii) second preimage resistance (iv) collision resistance (v) resistance to the length-extension attack (vi) For any m ≤ n, the hash function specied by taking a xed subset of m bits of the function's output is required to satisfy properties (ii)-(v) with n replaced by m 4 / 17 (i) At least one variant must support HMAC and randomized hashing (v) resistance to the length-extension attack (vii) Additionally, we analyze the indierentiability NIST's Security Requirements Hash function must provide message digests of 224; 256; 384 and 512 bits For all n-bit digest values, the hash function must provide (ii) preimage resistance (iii) second preimage resistance (iv) collision resistance (vi) For any m ≤ n, the hash function specied by taking a xed subset of m bits of the function's output is required to satisfy properties (ii)-(v) with n replaced by m 4 / 17 (i) At least one variant must support HMAC and randomized hashing (v) resistance to the length-extension attack (vii) Additionally, we analyze the indierentiability NIST's Security Requirements Hash function must provide message digests of 224; 256; 384 and 512 bits For all n-bit digest values, the hash function must provide (ii) preimage resistance (iii) second preimage resistance (iv) collision resistance (vi) For any m ≤ n, the hash function specied by taking a xed subset of m bits of the function's output is required to satisfy properties (ii)-(v) with n replaced by m 4 / 17 224; ; 384 (i) At least one variant must support HMAC and randomized hashing (v) resistance to the length-extension attack (vi) For any m ≤ n, the hash function specied by taking a xed subset of m bits of the function's output is required to satisfy properties (ii)-(v) with n replaced by m (vii) Additionally, we analyze the indierentiability NIST's Security Requirements Hash function must provide message digests of 256 and 512 bits For all n-bit digest values, the hash function must provide (ii) preimage resistance (iii) second preimage resistance (iv) collision resistance 4 / 17 224; ; 384 (i) At least one variant must support HMAC and randomized hashing (v) resistance to the length-extension attack (vi) For any m ≤ n, the hash function specied by taking a xed subset of m bits of the function's output is required to satisfy properties (ii)-(v) with n replaced by m NIST's Security Requirements Hash function must provide message digests of 256 and 512 bits For all n-bit digest values, the hash function must provide (ii) preimage resistance (iii) second preimage resistance (iv) collision resistance (vii) Additionally, we analyze the indierentiability 4 / 17 Outline 1 NIST's SHA-3 Hash Function Competition 2 Security Notions of Hash Functions 3 Classication of Security Reductions 4 Conclusions 5 / 17 - pre/sec/col security Advantage of an adversary (with query access to these primitives) in nding preimages, second preimages or collisions Davies-Meyer construction Preimage and collision resistant if E is assumed to be an ideal block cipher Security Notions of Hash Functions Security in the Ideal Model 6 / 17 - pre/sec/col security Advantage of an adversary (with query access to these primitives) in nding preimages, second preimages or collisions Davies-Meyer construction Preimage and collision resistant if E is assumed to be an ideal block cipher Security Notions of Hash Functions Security in the Ideal Model Assumption: design is built on one or more ideal underlying primitives 6 / 17 - Davies-Meyer construction Preimage and collision resistant if E is assumed to be an ideal block cipher Security Notions of Hash Functions Security in the Ideal Model Assumption: design is built on one or more ideal underlying primitives pre/sec/col security Advantage of an adversary (with query access to these primitives) in nding preimages, second preimages or collisions 6 / 17 - Security Notions of Hash Functions Security in the Ideal Model Assumption: design is built on one or more ideal underlying primitives pre/sec/col security Advantage of an adversary (with query access to these primitives) in nding preimages, second preimages or collisions Davies-Meyer construction Preimage and collision resistant if E is assumed to be an ideal block cipher 6 / 17 Advcol: advantage of a collision nding adversary for H H col PrRO : success probability of nding collision for H generically Advindi : indierentiability bound of H H Advcol Prcol Advindi H ≤ RO + H (formal proof in the full version of the paper) Indierentiability bound implies security bounds for pre/sec/col/... Security Notions of Hash Functions Security in the Ideal Model Indierentiability (indi) Advantage of a distinguisher to dierentiate H from a RO 7 / 17 Advcol: advantage of a collision nding adversary for H H col PrRO : success probability of nding collision for H generically Advindi : indierentiability bound of H H Advcol Prcol Advindi H ≤ RO + H (formal proof in the full version of the paper) Security Notions of Hash Functions Security in the Ideal Model Indierentiability (indi) Advantage of a distinguisher to dierentiate H from a RO Indierentiability bound implies security bounds for pre/sec/col/... 7 / 17 Advcol Prcol Advindi H ≤ RO + H (formal proof in the full version of the paper) Security Notions of Hash Functions Security in the Ideal Model Indierentiability (indi) Advantage of a distinguisher to dierentiate H from a RO Indierentiability bound implies security bounds for pre/sec/col/... Advcol: advantage of a collision nding adversary for H H col PrRO : success probability of nding collision for H generically Advindi : indierentiability bound of H H 7 / 17 Security Notions of Hash Functions Security in the Ideal Model Indierentiability (indi) Advantage of a distinguisher to dierentiate H from a RO Indierentiability bound implies security bounds for pre/sec/col/... Advcol: advantage of a collision nding adversary for H H col PrRO : success probability of nding collision for H generically Advindi : indierentiability bound of H H Advcol Prcol Advindi H ≤ RO + H (formal proof in the full version of the paper) 7 / 17 Security Notions of Hash Functions Security in the Standard Model 8 / 17 Security Notions of Hash Functions Security in the Standard Model Generic collision security of H (gcol) Advantage of an ecient adversary in nding collisions for H 8 / 17 Security Notions of Hash Functions Security in the Standard Model Generic collision security of H (gcol) Advantage of an ecient adversary in nding collisions for H Strengthened Merkle-Damgård Strengthened Merkle-Damgård preserves collision resistance: collisions for the hash function imply collisions for the compression function Extension: all SHA-3 candidates with a sux-free padding preserve collision resistance 8 / 17 - Generalized MD with sux-free padding preserves collision-resistance Collisions for this design imply collisions for f or chop g l−n ◦ Formal proof in the full version of the paper Security Notions of Hash Functions Security in the Standard Model All SHA-3 candidates follow this `generalized Merkle-Damgård design', where g may equal f , and the chopping is optional 9 / 17 - Security Notions of Hash Functions Security in the Standard Model All SHA-3 candidates follow this `generalized Merkle-Damgård design', where g may equal f , and the chopping is optional Generalized MD with sux-free padding preserves collision-resistance

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    56 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us