Alpha - Dbl: A reasonable high secure double - block - length hash function
Chúng tôi đề xuất một hàm nén độ
dài khối kép mới được gọi là Alpha-DBL. Lược đồ
này sử dụng hai lược đồ độ dài khối đơn an toàn
song song dựa trên mã khối với khóa 𝟐𝒏-bit và
kích thước khối 𝒏-bit để nén chuỗi 𝟑𝒏-bit thành
chuỗi 𝟐𝒏-bit. Chúng tôi đã chứng minh rằng, lược
đồ Alpha-DBL đạt được cận an toàn kháng va
chạm và kháng tiền ảnh gần như tối ưu (tối đa 𝟐𝒏
và 𝟐𝟐𝒏 truy vấn tương ứng để tìm va chạm và tiền
ảnh). Cụ thể với 𝒏 = 𝟏𝟐𝟖, một kẻ tấn công bất kỳ
thực hiện ít hơn 𝟐𝒏−𝟏.𝟐𝟕 = 𝟐𝟏𝟐𝟔.𝟕𝟑 truy vấn chỉ có
thể tìm thấy một va chạm với xác suất nhỏ hơn 1/2.
Theo hiểu biết của chúng tôi, cận an toàn kháng va
chạm này tốt hơn so với các hàm nén khác. Ngoài
ra, chúng tôi đã đưa ra phân tích độ an toàn kháng
tiền ảnh của Alpha-DBL cho thấy cận an toàn là
2𝟐𝟐𝒏−𝟓 = 𝟐𝟐𝟓𝟏 truy vấn cho 𝒏 = 𝟏𝟐𝟖. Sử dụng
lược đồ này trong việc xây dựng hàm băm được
lặp có thể bảo toàn độ an toàn kháng va chạm và
an toàn kháng tiền ảnh

Trang 1

Trang 2

Trang 3

Trang 4

Trang 5

Trang 6

Trang 7
Tóm tắt nội dung tài liệu: Alpha - Dbl: A reasonable high secure double - block - length hash function
Khoa học và Công nghệ trong lĩnh vực An toàn thông tin
Số 2.CS (12) 2020 11
Hoang Dinh Linh, Tran Hong Thai
Abstract—We propose a new double-block-
length compression function which is called
Alpha-DBL. This scheme uses two parallel secure
single block length schemes based on a block
cipher with 𝟐𝒏-bit key and 𝒏-bit block size to
compress a 𝟑𝒏-bit string to a 𝟐𝒏-bit one. We show
that the Alpha-DBL scheme attains nearly
optimal collision security and preimage security
bounds (up to 𝟐𝒏 and 𝟐𝟐𝒏 queries for finding a
collision and a preimage, respectively). More
precisely, for 𝒏 = 𝟏𝟐𝟖, no adversary making less
than 𝟐𝒏−𝟏.𝟐𝟕 = 𝟐𝟏𝟐𝟔.𝟕𝟑 queries can find a collision
with probability greater than 1/2. To our
knowledge, this collision security bound is nearly
better than other such compression functions. In
addition, we provide a preimage security analysis
of Alpha-DBL that shows security bound of
𝟐𝟐𝒏−𝟓 = 𝟐𝟐𝟓𝟏 queries for 𝒏 = 𝟏𝟐𝟖. Using this
scheme in the iterated hash function construction
can preserve the collision resistance security and
the preimage resistance security.
Tóm tắt—Chúng tôi đề xuất một hàm nén độ
dài khối kép mới được gọi là Alpha-DBL. Lược đồ
này sử dụng hai lược đồ độ dài khối đơn an toàn
song song dựa trên mã khối với khóa 𝟐𝒏-bit và
kích thước khối 𝒏-bit để nén chuỗi 𝟑𝒏-bit thành
chuỗi 𝟐𝒏-bit. Chúng tôi đã chứng minh rằng, lược
đồ Alpha-DBL đạt được cận an toàn kháng va
chạm và kháng tiền ảnh gần như tối ưu (tối đa 𝟐𝒏
và 𝟐𝟐𝒏 truy vấn tương ứng để tìm va chạm và tiền
ảnh). Cụ thể với 𝒏 = 𝟏𝟐𝟖, một kẻ tấn công bất kỳ
thực hiện ít hơn 𝟐𝒏−𝟏.𝟐𝟕 = 𝟐𝟏𝟐𝟔.𝟕𝟑 truy vấn chỉ có
thể tìm thấy một va chạm với xác suất nhỏ hơn 1/2.
Theo hiểu biết của chúng tôi, cận an toàn kháng va
chạm này tốt hơn so với các hàm nén khác. Ngoài
ra, chúng tôi đã đưa ra phân tích độ an toàn kháng
tiền ảnh của Alpha-DBL cho thấy cận an toàn là
2𝟐𝟐𝒏−𝟓 = 𝟐𝟐𝟓𝟏 truy vấn cho 𝒏 = 𝟏𝟐𝟖. Sử dụng
lược đồ này trong việc xây dựng hàm băm được
lặp có thể bảo toàn độ an toàn kháng va chạm và
an toàn kháng tiền ảnh.
This manuscript is received on December 23, 2020. It is
commented on December 24, 2020 and is accepted on
December 24, 2020 by the first reviewer. It is commented on
December 30, 2020 and is accepted on December 30, 2020 by
the second reviewer.
Keywords—double-block-length compression function,
collision security, preimage security, ideal cipher model.
Từ khóa—hàm nén độ dài khối kép, độ an toàn kháng va
chạm, độ an toàn kháng tiền ảnh, mô hình mã pháp lý tưởng.
I. INTRODUCTION
A cryptographic hash function is a function
which takes an input of arbitrary length and
returns an output of fixed length. A general way
of hashing messages of arbitrary length is to
repeat a compression function using some general
structures, e.g. Merkle-Damgard, HAIFA... A
base compression function can be built from a
mishmash of components or based on
cryptographic primitives such as block ciphers.
Block cipher-based compression functions
have been extensively studied. The most
common approach is to build a 2𝑛-bit to 𝑛-bit
compression function using a block cipher of
𝑛-bit block length, namely a single-block-
length (SBL) compression function. However,
such an SBL compression function may be
susceptible to collision attacks because of its
short output length. For example, we can
successfully execute a birthday attack on an
SBL compression function based on the AES-
128 that only approximates 264 queries. This
prompted the study of double-block-length
(DBL) compression functions which have the
output length double the block length of the
base block cipher.
DBL compression function can be classified
into 2 classes: The first class are compression
functions that use a block cipher with the key
length of 𝑛-bit, i.e. 𝐸: {0,1}𝑛 × {0,1}𝑛 → {0,1}𝑛,
denoted by 𝐷𝐵𝐿𝑛. The second class are
compression functions that use a block cipher
with the key length of 2𝑛-bit, i.e. 𝐸: {0,1}2𝑛 ×
{0,1}𝑛 → {0,1}𝑛, denoted by 𝐷𝐵𝐿2𝑛. This class
consists of Tandem-DM [1] and Abreast-DM [1],
Hirose’s scheme [2], Stam’s Type-I compression
function [3] and general constructions of Hirose
[4] and Ozen and Stam construction [5]. All the
above compression functions provide optimal
Alpha-DBL: A Reasonable High Secure
Double-Block-Length Hash Function
Journal of Science and Technology on Information security
12 No 2.CS (12) 2020
collision security (up to 2𝑛 queries), Tandem-
DM, Abreast-DM and Hirose’s scheme have also
proven to be optimal preimage resistance (up to
22𝑛 queries).
Recently, there have been some proposed
compression schemes such as Weimar-DM [6],
and MR-MMO [7]. The Weimar-DM scheme
uses two different keys for two block ciphers in a
compression function call and is proven secure in
the ideal cipher model (ICM). The MR-MMO
scheme claimed by the author is more effective
when using only one key for both block ciphers in
a compression function call, but is proven in the
weak cipher model (WCM). The MR-MMO is
claimed that its collision resistance security bound
is tighter than Weimar-DM’s one but it is not valid
in our understanding of the matter. The first
reason is that Weimar-DM is considered in the
ICM while MR-MMO is studied in the WCM.
Secondly, there is an incorrect statement in the
proof for MR-MMO’s collision security bound.
More precisely, in [7] the authors stated that:
Pr[𝐶𝑗] ≤
2(𝑗 − 1)
(2𝑛 − (2𝑗 − 1))
2 ≤
2(𝑗 − 1)
22𝑛
,
for 𝑗 ≤ 𝑞. It is clear that this statement is wrong
which implies that the collision resistance
security bound is incorrect. On the other hand,
the two schemes are in the class of cyclic
compression functions [8], which have been
shown to be secure generally.
TABLE 1. THE ANALYSIS RE ... �ℎ𝑡𝑚𝑜𝑠𝑡𝑛(�̅�𝑎)
= 𝑌𝑏 ⊕ 𝑋𝑏 ⊕ 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑏),
where 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(𝐾) and 𝐿𝑒𝑓𝑡𝑚𝑜𝑠𝑡𝑛(𝐾) are
𝑛 bits farthest to the right and 𝑛 bits farthest to
the left of 𝐾, respectively.
Indeed, the condition (i) implies a collision
pair (𝐺𝑎 , 𝐻𝑎 , 𝑀𝑎), (𝐺𝑏, 𝐻𝑏 , 𝑀𝑏) with
𝐻𝑎 = 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑎),
𝑀𝑎 = 𝐿𝑒𝑓𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑎), 𝐺𝑎 = 𝑋𝑎 ⊕ 𝑀𝑎 ,
𝐻𝑏 = 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑏),
𝑀𝑏 = 𝐿𝑒𝑓𝑡𝑚𝑜𝑠𝑡𝑛(�̅�𝑏), 𝐺𝑏 = 𝑋𝑏 ⊕ 𝑀𝑏.
The condition (ii) implies a collision pair
(𝐺𝑎 , 𝐻𝑎 , 𝑀𝑎), (𝐺𝑏, 𝐻𝑏, 𝑀𝑏) with
𝐻𝑎 = 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑎),
𝑀𝑎 = 𝐿𝑒𝑓𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑎), 𝐺𝑎 = 𝑋𝑎 ⊕ 𝑀𝑎 ,
𝐻𝑏 = 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(�̅�𝑏),
𝑀𝑏 = 𝐿𝑒𝑓𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑏), 𝐺𝑏 = 𝑋𝑏 ⊕ 𝑀𝑏.
Construction of the list: The adversary 𝒜 will
make a query number 𝑖 to 𝐸 or 𝐸−1 for 1 ≤ 𝑖 ≤
𝑞. Then the adversary gets a triple-tuple
(𝑋𝑖, 𝐾𝑖 , 𝑌𝑖) such that 𝐸𝐾𝑖(𝑋𝑖) = 𝑌𝑖 in case of a
forward query and 𝐸𝐾𝑖
−1(𝑌𝑖) = 𝑋𝑖 in case of a
backward query. In either case, the value 𝑋𝑖 ⊕
𝑌𝑖 ⊕ 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑖) is randomly determined
by the output of the query.
Now, 𝒜′ checks if an entry 𝐿 = (𝑋𝑖, 𝐾𝑖 ,∗,∗) or
𝐿′ = (𝑋𝑖, 𝐾𝑖 ,∗,∗) belongs to the recent list ℒ,
where “∗” is an arbitrary value. Obviously, there
are 2 scenarios: both 𝐿, 𝐿′ are not in ℒ, or both of
them are already in ℒ. Indeed, if 𝐿𝑖: =
(𝑋𝑖, 𝐾𝑖 , 𝑌𝑖 , 𝑌𝑖′) ∈ ℒ then we also have 𝐿𝑖: =
(𝑋𝑖, 𝐾𝑖 , 𝑌𝑖′, 𝑌𝑖) ∈ ℒ.
Scenario 1: If 𝐿 or 𝐿′ are not in ℒ. Then 𝒜′ will
make an additional forward query 𝑌𝑖′ = 𝐸�̅�𝑖(𝑋𝑖).
Since 𝐾𝑖 ≠ 𝐾𝑖 for every 𝐾𝑖 ∈ {0,1}
𝑛 then the
value of 𝑌𝑖′ is independently and randomly
distributed with 𝑌𝑖. Then, the adversary sets
𝐿𝑖: = (𝑋𝑖, 𝐾𝑖 , 𝑌𝑖 , 𝑌𝑖′)
and appends to the list ℒ.
Let 𝑆𝑢𝑐𝑐𝑒𝑠𝑠𝑖, for 1 ≤ 𝑖 ≤ 𝑞, be the event that
the 𝑖𝑡ℎ success, i.e. there exists 𝑗 < 𝑖 such that 𝐿𝑖
collide with 𝐿𝑗. For 1 ≤ 𝑗 < 𝑖, we have:
Pr [
𝑋𝑖 ⊕ 𝑌𝑖 ⊕ 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑖)
= 𝑋𝑗 ⊕ 𝑌𝑗 ⊕ 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑗)
] ≤
1
𝑁 − 𝑞
and
Pr [
𝑋𝑖 ⊕ 𝑌𝑖
′ ⊕ 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(�̅�𝑖)
= 𝑋𝑗 ⊕ 𝑌𝑗′ ⊕ 𝑅𝑖𝑔ℎ𝑡𝑚𝑜𝑠𝑡𝑛(𝐾𝑗)
] ≤
1
𝑁 − 𝑞
.
Since these above events are independent then
the probability of condition (i) occurring is at
most
1
(𝑁−𝑞)2
. Similarly, the probability of
condition (ii) occurring is at most
1
(𝑁−𝑞)2
.
Therefore, the probability of success of the 𝑖𝑡ℎ
query is
Pr[𝑆𝑢𝑐𝑐𝑒𝑠𝑠𝑖] ≤ ∑
𝑖−1
𝑗=1
2
(𝑁 − 𝑞)2
=
2(𝑖 − 1)
(𝑁 − 𝑞)2
.
Khoa học và Công nghệ trong lĩnh vực An toàn thông tin
Số 2.CS (12) 2020 15
Thus, the total probability of success for 𝑞
queries is
Pr[𝑆𝑢𝑐𝑐𝑒𝑠𝑠(𝑞)] ≤ ∑ Pr[𝑆𝑢𝑐𝑐𝑒𝑠𝑠𝑖] ≤
𝑞(𝑞 − 1)
(𝑁 − 𝑞)2
𝑞
𝑖=1
.
Scenario 2: Both 𝐿 and 𝐿′ are in ℒ. Therefore,
𝒜′ ignores this query and we know that 𝒜 has
no chance of winning.
Therefore, the probability of the adversary
𝒜′ success is
𝐴𝑑𝑣
𝐹𝐴𝑙𝑝ℎ𝑎
𝐶𝑜𝑙𝑙 (𝒜′) ≤
𝑞(𝑞 − 1)
(𝑁 − 𝑞)2
.
Now, we return to evaluate the advantage of
𝒜. We have
𝐴𝑑𝑣
𝐹𝐴𝑙𝑝ℎ𝑎
𝐶𝑜𝑙𝑙 (𝒜) ≤ 𝐴𝑑𝑣
𝐹𝐴𝑙𝑝ℎ𝑎
𝐶𝑜𝑙𝑙 (𝒜′) ≤
𝑞(𝑞 − 1)
(𝑁 − 𝑞)2
.
Since 𝒜 is an arbitrary 𝑞-query adversary then
𝐴𝑑𝑣𝐴𝑙𝑝ℎ𝑎
𝐶𝑜𝑙𝑙 (𝑞) ≤
𝑞(𝑞 − 1)
(𝑁 − 𝑞)2
.
We can easily get the following corollary:
Corollary 1. Let 𝐹𝐴𝑙𝑝ℎ𝑎: {0,1}3𝑛 → {0,1}2𝑛 be
a compression function based on block cipher
as defined in Definition 1. Then for 𝑞 ≤ 2𝑛−1.27
we have
𝐴𝑑𝑣𝐴𝑙𝑝ℎ𝑎
𝐶𝑜𝑙𝑙 (𝑞) ≤
1
2
+ 𝑜(1)
where 𝑜(1) tends to 0 when 𝑛 tends to infinity.
Proof. Firstly, it can be seen that the right hand
side of Theorem 1 is an increasing function in 𝑞
for 𝑞 < 𝑁. Consider
𝑞(𝑞 − 1)
(𝑁 − 𝑞)2
=
1
2
.
We get
𝑞 ≈ 𝑁(√2 − 1) = 2𝑛−1.27.
Applying Theorem 1, we have the proof.
For example, for 𝑛 = 128 Corollary 1 implies
that any adversary making less than 2126.73
queries cannot find a collision with probability
greater than 1/2.
The MD-strengthening design preserves
collision resistance (see Theorem 2.4.1, [11]).
Combining this with Theorem 1, we get the
following theorem:
Theorem 2. Let 𝐻 be an iterated hash function
built on the compression function 𝐹 defined in
Definition 1. Then
𝐴𝑑𝑣𝐻
𝐶𝑜𝑙𝑙(𝑞) ≤
𝑞(𝑞−1)
(𝑁−𝑞)2
, for every 1 ≤ 𝑞 < 𝑁.
B. Preimage resistance security
Theorem 3. Let 𝐹𝐴𝑙𝑝ℎ𝑎: {0,1}3𝑛 → {0,1}2𝑛 be a
compression function based on block cipher as
defined in Definition 1. Then
𝐴𝑑𝑣𝐴𝑙𝑝ℎ𝑎
𝑃𝑟𝑒 (𝑞) ≤
16𝑞
𝑁2
.
Proof. The idea of the proof follows the proofs of
Theorems 1 and 2 in [9]. Let 𝑈||𝑉 ∈ {0,1}2𝑛 be
the preimage target (chosen by the adversary
before he mounts any query to 𝐸). We need to
upper bound the probability that the adversary
finds a point 𝐴||𝐿||𝑀 ∈ {0,1}3𝑛 such that
𝐹𝐴𝑙𝑝ℎ𝑎(𝐴, 𝐿, 𝑀) = (𝑈, 𝑉) using 𝑞 queries.
We also reuse the notion of free queries and
super queries [9]:
After the adversary asks a forward query
𝐸�̅�||𝑀(𝐴 ⊕ 𝐿), it is given the answer of the query
𝐸𝐿||�̅�(𝐴 ⊕ 𝐿) for free. Similarly, if the adversary
makes a backward query 𝐸�̅�||𝑀
−1 (𝑅), and receives
an answer 𝐴 ⊕ 𝐿 = 𝐸�̅�||𝑀
−1 (𝑅) then the answer of
the forward query 𝐸𝐿||�̅�(𝐴 ⊕ 𝐿) is given for free.
Therefore, the entries of the adversary’s query
history 𝒬 can be grouped into adjacent pairs of
the form (𝐴 ⊕ 𝐿, �̅�||𝑀, 𝑅), (𝐴 ⊕ 𝐿, 𝐿||�̅�, 𝑆),
namely “adjacent query pair”.
After completing each adjacent query
pair, we check whether the key 𝐾 ∈ {0,1}2𝑛
used for the latest query satisfies the query
history contains exactly 𝑁/2 queries with this
key. If this occurs, all remaining queries under
the key 𝐾 and the remaining queries under key
𝐾 will be given to the adversary for free. We add
these 𝑁/2 free query pairs to the query history.
Since the adversary is assumed never to make a
query to which it knows the answer, then the
adversary cannot make any more queries under
this key after these free queries have been added
into the query history. We say that a super query
occurs if and only if 𝑁/2 free query pairs are
given to the adversary. Note that a super query
Journal of Science and Technology on Information security
16 No 2.CS (12) 2020
is the set of 𝑁/2 free query pairs that returned
to the adversary.
An adjacent query pair (𝐴 ⊕ 𝐿, �̅�||𝑀, 𝑅),
(𝐴 ⊕ 𝐿, 𝐿||�̅�, 𝑆) is called “winning” if
𝐴 ⊕ 𝐿 ⊕ 𝑅 ⊕ 𝑀 = 𝑈 and 𝐴 ⊕ 𝐿 ⊕ 𝑆 ⊕ �̅� = 𝑉,
or if
𝐴 ⊕ 𝐿 ⊕ 𝑅 ⊕ 𝑀 = 𝑉 and 𝐴 ⊕ 𝐿 ⊕ 𝑆 ⊕ �̅� = 𝑈.
Therefore, if the adversary obtains a winning
adjacent query pair then it obtains a preimage of
𝑈||𝑉. In addition, the winning query pair is part
of a super query or not. Let
𝑆𝑢𝑝𝑒𝑟𝑄𝑢𝑒𝑟𝑦𝑊𝑖𝑛(𝒬) and
𝑁𝑜𝑟𝑚𝑎𝑙𝑄𝑢𝑒𝑟𝑦𝑊𝑖𝑛(𝒬) be the event that the
adversary obtains a winning query pair that is
part of a super query and normal queries,
respectively. Therefore, we need to upper bound
Pr[𝑆𝑢𝑝𝑒𝑟𝑄𝑢𝑒𝑟𝑦𝑊𝑖𝑛(𝒬)]
+ Pr[𝑁𝑜𝑟𝑚𝑎𝑙𝑄𝑢𝑒𝑟𝑦𝑊𝑖𝑛(𝒬)].
When the event 𝑁𝑜𝑟𝑚𝑎𝑙𝑄𝑢𝑒𝑟𝑦𝑊𝑖𝑛(𝒬)
occurs. Assume that the adversary asks a forward
query 𝐸�̅�||𝑀(𝐴 ⊕ 𝐿), then at most (𝑁/2 − 2)
queries (including free queries) have been
previously answered with the key �̅�||𝑀. It’s
implies that,
Pr[𝐴 ⊕ 𝐿 ⊕ 𝑅 ⊕ 𝑀 = 𝑈] ≤
2
𝑁
.
If 𝐴 ⊕ 𝐿 ⊕ 𝑅 ⊕ 𝑀 = 𝑈 then the probability
of the free query 𝐸𝐿||�̅�(𝐴 ⊕ 𝐿) returns 𝐴 ⊕ 𝐿 ⊕
𝑉 ⊕ 𝑀 that is at most 1/(𝑁/2) = 2/𝑁, since the
answer to the free query comes uniformly at
random from a set of size at least 𝑁/2 + 2 >
𝑁/2. Therefore, we have
Pr [
(𝐴 ⊕ 𝐿 ⊕ 𝑅 ⊕ 𝑀 = 𝑈) ∧
(𝐴 ⊕ 𝐿 ⊕ 𝑆 ⊕ �̅� = 𝑉)
] ≤
4
𝑁2
.
Similarly,
Pr [
(𝐴 ⊕ 𝐿 ⊕ 𝑅 ⊕ 𝑀 = 𝑉) ∧
(𝐴 ⊕ 𝐿 ⊕ 𝑆 ⊕ �̅� = 𝑈)
] ≤
4
𝑁2
.
Moreover, since the adversary makes 𝑞
queries total then we have
Pr[𝑁𝑜𝑟𝑚𝑎𝑙𝑄𝑢𝑒𝑟𝑦𝑊𝑖𝑛(𝒬)] ≤
8𝑞
𝑁2
. (1)
In case the event 𝑆𝑢𝑝𝑒𝑟𝑄𝑢𝑒𝑟𝑦𝑊𝑖𝑛(𝒬)
occurs. Assume that a super query occur on keys
�̅�||𝑀 and 𝐿||�̅�, then the value of 𝐸�̅�||𝑀(. ) and
𝐸𝐿||�̅�(. ) is already known on exactly 𝑁/2 points.
Let 𝒟 and ℛ be the domain and the range of that
super query, respectively. If 𝐴 ⊕ 𝐿 ∈ 𝒟 then the
probability that 𝐸�̅�||𝑀(𝐴 ⊕ 𝐿) ⊕ 𝐴 ⊕ 𝐿 ⊕ 𝑀 =
𝑈 is either 0 if 𝐴 ⊕ 𝐿 ⊕ 𝑀 ⊕ 𝑈 ∉ ℛ, or is
exactly 2/𝑁 if 𝐴 ⊕ 𝐿 ⊕ 𝑀 ⊕ 𝑈 ∈ ℛ. Thus, the
probability that 𝐸�̅�||𝑀(𝐴 ⊕ 𝐿) ∈ {𝑈 ⊕ 𝐴 ⊕ 𝐿 ⊕
𝑀, 𝑉 ⊕ 𝐴 ⊕ 𝐿 ⊕ 𝑀} is at most 4/𝑁.
If 𝐸�̅�||𝑀(𝐴 ⊕ 𝐿) ∈ {𝑈 ⊕ 𝐴 ⊕ 𝐿 ⊕ 𝑀, 𝑉 ⊕
𝐴 ⊕ 𝐿 ⊕ 𝑀}, then the probability that
𝐸𝐿||�̅�(𝐴 ⊕ 𝐿) ∈ {𝑈 ⊕ 𝐴 ⊕ 𝐿 ⊕ �̅�, 𝑉 ⊕ 𝐴 ⊕
𝐿 ⊕ �̅�} is at most 1/(𝑁/2). Therefore, the
probability that the super query produces a
winning pair of adjacent queries is at most
𝑁
2
×
8
𝑁2
=
4
𝑁
. Since there are at most 𝑞/(𝑁/2) super
queries, we have
Pr[𝑆𝑢𝑝𝑒𝑟𝑄𝑢𝑒𝑟𝑦𝑊𝑖𝑛(𝒬)] ≤
8𝑞
𝑁2
. (2)
Combining (1) with (2) completes the proof.
Corollary 2. Let 𝐹𝐴𝑙𝑝ℎ𝑎: {0,1}3𝑛 → {0,1}2𝑛 be a
compression function based on block cipher as
defined in Definition 1. Then
𝐴𝑑𝑣𝐴𝑙𝑝ℎ𝑎
𝑃𝑟𝑒 (22𝑛−5) ≤
1
2
.
Proof. Considering 𝑞 ≤
1
32
𝑁2. Applying
Theorem 3, we have
𝐴𝑑𝑣𝐴𝑙𝑝ℎ𝑎
𝑃𝑟𝑒 (22𝑛−5) ≤
1
2
.
For example, for 𝑛 = 128 Corollary 2
implies that any adversary making less than
2251 queries cannot find a preimage with a
considerable probability.
The Merkle-Damgard design also preserves
preimage resistance (see Theorem 2.4.2, [11]).
Combining Theorem 3 with Theorem 2.4.2 [11],
we get the preimage resistance of a hash function
composed of 𝐹 in Definition 1.
Theorem 4. Let 𝐻 be an iterated hash function
built on the compression function 𝐹 specified in
Definition 1. Then
𝐴𝑑𝑣𝐻
𝑃𝑟𝑒(𝑞) ≤
16𝑞
𝑁2
.
Khoa học và Công nghệ trong lĩnh vực An toàn thông tin
Số 2.CS (12) 2020 17
V. CONCLUSION
In this paper, we have proposed a double
block length compression function called
Alpha-DBL. We have shown very tight
collision security bound for the proposed
scheme. To our knowledge, the collision
security bound of the proposed scheme is nearly
better than other double block length schemes.
On the other hand, the proposed scheme also
achieves the same preimage security bound as
the Weimar-DM scheme, which is nearly the
best second preimage security bound. Using our
compression function in the iterated hash
function construction can preserve the collision
resistance and preimage resistance security.
Moreover, it is shown in [12] that under certain
conditions, collision resistance implies second
preimage resistance. Thus, we conclude that our
proposed hash function is second preimage
resistance as well.
REFERENCES
[1] Lai, X. and Massey, J.L. “Hash functions based
on block ciphers”. Workshop on the Theory and
Application of Cryptographic Techniques.
Springer, Berlin, Heidelberg, 1992.
[2] Hirose, S. “Some plausible constructions of
double-block-length hash functions”.
International Workshop on Fast Software
Encryption. Springer, Berlin, Heidelberg, 2006.
[3] Stam, M. “Blockcipher-based hashing
revisited”. Fast Software Encryption. Springer,
Berlin, Heidelberg, 2009.
[4] Hirose, S. “Provably secure double-block-length
hash functions in a black-box model.
International Conference on Information
Security and Cryptology. Springer, Berlin,
Heidelberg, 2004.
[5] Özen, O. and Stam, M. “Another glance at
double-length hashing”. IMA International
Conference on Cryptography and Coding.
Springer, Berlin, Heidelberg, 2009.
[6] Fleischmann, Ewan, et al. “Weimar-DM: a
highly secure double-length compression
function”. Australasian Conference on
Information Security and Privacy. Springer,
Berlin, Heidelberg, 2012.
[7] Miyaji, A. and Rashed, M. “A new (n, 2n) double
block length hash function based on single key
scheduling”. The 29th International Conference
on Advanced Information Networking and
Applications (AINA), IEEE, 2015.
[8] Fleischmann, E., Gorski, M., and Lucks, S.
“Security of cyclic double block length hash
functions”. IMA International Conference on
Cryptography and Coding. Springer, Berlin,
Heidelberg, 2009.
[9] Armknecht, F., et al. “The preimage security of
double-block-length compression functions”.
International Conference on the Theory and
Application of Cryptology and Information
Security. Springer, Berlin, Heidelberg, 2011.
[10] Lee, J., Stam, M., and Steinberger, J. “The
security of Tandem-DM in the ideal cipher
model”. Journal of Cryptology, 2017. 30(2): p.
495-518
[11] Mennink, B., “Provable security of
cryptographic hash functions”. University of
Bristol, UK, 2013.
[12] Rogaway, P., Shrimpton, T. “Cryptographic
hash-function basics: Definitions, implications,
and separations for preimage resistance, second-
preimage resistance, and collision resistance”. In
International workshop on fast software
encryption. Springer, Berlin, Heidelberg, 2004.
ABOUT THE AUTHOR
Hoang Dinh Linh
Workplace: Institute of Cryptographic
Science and Technology
Email: hoangdinhlinh@bcy.gov.vn
Education: Received a Bachelor’s
degree in Mathematics in Hanoi
University of Science in 2014.
Current research direction: symmetric cryptography
algorithm, random number generation, randomness tests.
Tran Hong Thai
Workplace: Institute of
Cryptographic Science and
Technology
Email: ththai@bcy.gov.vn
Education: Received an Engineer’s
degree in 2000 and Master's degree in
Cryptographic Engineering in 2007, Academy of
Cryptography Techniques.
Current research direction: research and evaluate the
security of cryptographic hashes and block ciphers.
File đính kèm:
alpha_dbl_a_reasonable_high_secure_double_block_length_hash.pdf

