Interpreting hash function security proofs

  • Authors:
  • Juraj Šarinay

  • Affiliations:
  • EPFL, IC LACAL, Lausanne, Switzerland

  • Venue:
  • ProvSec'10 Proceedings of the 4th international conference on Provable security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We provide a concrete security treatment of several "provably secure" hash functions. Interpreting arguments behind MQ-HASH, FSB, SWIFFTX and VSH we identify similar lines of reasoning. We aim to formulate the main security claims in a language closer to that of attacks. We evaluate designers' claims of provable security and quantify them more precisely, deriving "second order" bounds on bounds. While the authors of FSB, MQ-HASH and SWIFFT(X) prove existence of non-trivial lower bounds on security, we show that the quantification of the bounds limits the practical significance of the proofs.