Collision Resistance of the JH Hash Function

Cited 8 time in webofscience Cited 0 time in scopus
  • Hit : 580
  • Download : 0
In this paper, we analyze collision resistance of the JH hash function in the ideal primitive model. The JH hash function is one of the five SHA-3 candidates accepted for the final round of evaluation. The JH hash function uses a mode of operation based on a permutation, while its security has been elusive even in the random permutation model. One can find a collision for the JH compression function only with two backward queries to the basing primitive. However, the security is significantly enhanced in iteration. For c <= n/2, we prove that the JH hash function using an ideal n-bit permutation and producing c-bit outputs by truncation is collision resistant up to O(2(c/2)) queries. This bound implies the optimal collision resistance of the JH hash function in the random permutation model.
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Issue Date
2012-03
Language
English
Article Type
Article
Citation

IEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.3, pp.1992 - 1995

ISSN
0018-9448
DOI
10.1109/TIT.2011.2173655
URI
http://hdl.handle.net/10203/212445
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 8 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0