Abstract
The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths shorter than that of the permutation. Under this assumption, we propose a permutation based compression function and prove its security with respect to collision and (second) preimage attacks in the ideal permutation model. The proposed compression function can be seen as a generalization of the compression function of MD6 hash function.
Original language | English |
---|---|
Journal | I E I C E Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
Volume | E93-A |
Issue number | 10 |
Pages (from-to) | 1833-1836 |
ISSN | 0916-8508 |
Publication status | Published - 2010 |
Keywords
- Compression function
- MD6
- SHA3
- Permutation