2012
DOI: 10.1007/978-3-642-32009-5_21
|View full text |Cite
|
Sign up to set email alerts
|

To Hash or Not to Hash Again? (In)Differentiability Results for $$H^2$$ and HMAC

Abstract: Abstract. We show that the second iterate H 2 (M ) = H(H(M )) of a random oracle H cannot achieve strong security in the sense of indifferentiability from a random oracle. We do so by proving that indifferentiability for H 2 holds only with poor concrete security by providing a lower bound (via an attack) and a matching upper bound (via a proof requiring new techniques) on the complexity of any successful simulator. We then investigate HMAC when it is used as a general-purpose hash function with arbitrary keys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
35
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 39 publications
(35 citation statements)
references
References 32 publications
0
35
0
Order By: Relevance
“…In their analysis, in addition to several proof results, two types of weak keys called colliding key pairs and ambiguous key pairs were introduced for HMAC, which are closely related to our work. Indeed, regarding the colliding key pairs, exactly the same distinguisher is mentioned in both [13,12] and our article. The details of the distinguisher is shown in the last paragraph of Section 7.…”
Section: Introductionmentioning
confidence: 58%
See 3 more Smart Citations
“…In their analysis, in addition to several proof results, two types of weak keys called colliding key pairs and ambiguous key pairs were introduced for HMAC, which are closely related to our work. Indeed, regarding the colliding key pairs, exactly the same distinguisher is mentioned in both [13,12] and our article. The details of the distinguisher is shown in the last paragraph of Section 7.…”
Section: Introductionmentioning
confidence: 58%
“…After the publication of the conference version of this paper, we realized that the indifferentiability of HMAC was independently and at almost the same time studied by Dodis et al [13,12]. Their purpose is to study whether or not HMAC is indifferentiable from a keyed random oracle for distinguishers that can choose arbitrary keys.…”
Section: Introductionmentioning
confidence: 93%
See 2 more Smart Citations
“…While obtaining a non-tight birthday-type bound for NMAC/HMAC is feasible (for most key-length values, a bound follow directly from the indifferentiability analysis of [7]), proving tight bounds in terms of compression function and construction queries on the generic PRF security of NMAC/HMAC is a challenging open problem, on which little progress has been made. The main challenge is to understand how partial information in form of f-queries can help the attacker to break security (i.e., distinguish) in settings with q C 2 c/2 / √ , when the attack from [8] does not apply.…”
Section: Introductionmentioning
confidence: 99%