Analysis of message injection in stream cipher-based hash functions

  • Authors:
  • Yuto Nakano;Carlos Cid;Kazuhide Fukushima;Shinsaku Kiyomoto

  • Affiliations:
  • KDDI R&D Laboratories Inc., Ohara, Fujimino, Saitama, Japan;Information Security Group, Royal Holloway, University of London, Egham, UK;KDDI R&D Laboratories Inc., Ohara, Fujimino, Saitama, Japan;KDDI R&D Laboratories Inc., Ohara, Fujimino, Saitama, Japan

  • Venue:
  • ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

A common approach for the construction of cryptographic hash functions is to design the algorithm based on an existing symmetric encryption primitive. While there has been extensive research on the design of block cipher-based hash functions, little has been done on the study of design and security of stream cipher-based hash functions (SCH). In this paper we discuss the general construction of stream cipherbased hash functions, devoting special attention to one of the function's crucial components: the message injection function. We define two types of message injection functions, which may be appended to the keystream generator (e.g. a stream cipher) to build an SCH. Based on these constructions, we evaluate the security of simple SCHs whose stream cipher function consists of a LFSR-based filter generator. We see this as an initial step in the more formal study of the security of hash function constructions based on stream ciphers.