Security Analysis of Constructions Combining FIL Random Oracles View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2007-01-01

AUTHORS

Yannick Seurin , Thomas Peyrin

ABSTRACT

We consider the security of compression functions built by combining smaller perfectly secure compression functions modeled as fixed input length random oracles. We give tight security bounds and generic attacks for various parameters of these constructions and apply our results to recent proposals of block cipher-based hash functions.

PAGES

119-136

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-74619-5_8

DOI

http://dx.doi.org/10.1007/978-3-540-74619-5_8

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1014901294


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "France Telecom R&D, 38-40 rue du G\u00e9n\u00e9ral Leclerc, F-92794 Issy-les-Moulineaux, France, Universit\u00e9 de Versailles, 45 avenue des Etats-Unis, F-78035 Versailles, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "France Telecom R&D, 38-40 rue du G\u00e9n\u00e9ral Leclerc, F-92794 Issy-les-Moulineaux, France, Universit\u00e9 de Versailles, 45 avenue des Etats-Unis, F-78035 Versailles, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seurin", 
        "givenName": "Yannick", 
        "id": "sg:person.011724731171.01", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "France Telecom R&D, 38-40 rue du G\u00e9n\u00e9ral Leclerc, F-92794 Issy-les-Moulineaux, France, Universit\u00e9 de Versailles, 45 avenue des Etats-Unis, F-78035 Versailles, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "France Telecom R&D, 38-40 rue du G\u00e9n\u00e9ral Leclerc, F-92794 Issy-les-Moulineaux, France, Universit\u00e9 de Versailles, 45 avenue des Etats-Unis, F-78035 Versailles, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Peyrin", 
        "givenName": "Thomas", 
        "id": "sg:person.011167161615.31", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011167161615.31"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2007-01-01", 
    "datePublishedReg": "2007-01-01", 
    "description": "We consider the security of compression functions built by combining smaller perfectly secure compression functions modeled as fixed input length random oracles. We give tight security bounds and generic attacks for various parameters of these constructions and apply our results to recent proposals of block cipher-based hash functions.", 
    "editor": [
      {
        "familyName": "Biryukov", 
        "givenName": "Alex", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-74619-5_8", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-74617-1", 
        "978-3-540-74619-5"
      ], 
      "name": "Fast Software Encryption", 
      "type": "Book"
    }, 
    "keywords": [
      "random oracles", 
      "compression function", 
      "secure compression functions", 
      "tight security bounds", 
      "security analysis", 
      "hash function", 
      "generic attacks", 
      "security bounds", 
      "oracle", 
      "security", 
      "recent proposal", 
      "attacks", 
      "proposal", 
      "bounds", 
      "construction", 
      "function", 
      "results", 
      "parameters", 
      "analysis"
    ], 
    "name": "Security Analysis of Constructions Combining FIL Random Oracles", 
    "pagination": "119-136", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1014901294"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-74619-5_8"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-74619-5_8", 
      "https://app.dimensions.ai/details/publication/pub.1014901294"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:49", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_240.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-74619-5_8"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-74619-5_8'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-74619-5_8'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-74619-5_8'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-74619-5_8'


 

This table displays all metadata directly associated to this object as RDF triples.

85 TRIPLES      22 PREDICATES      43 URIs      36 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-74619-5_8 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nc437794aace64a27b8d5732d1f9cdd8a
4 schema:datePublished 2007-01-01
5 schema:datePublishedReg 2007-01-01
6 schema:description We consider the security of compression functions built by combining smaller perfectly secure compression functions modeled as fixed input length random oracles. We give tight security bounds and generic attacks for various parameters of these constructions and apply our results to recent proposals of block cipher-based hash functions.
7 schema:editor Nabe67173a5134394ab11c43f2b144adb
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N73fe58426f0741e7b94a4262ccb69f83
11 schema:keywords analysis
12 attacks
13 bounds
14 compression function
15 construction
16 function
17 generic attacks
18 hash function
19 oracle
20 parameters
21 proposal
22 random oracles
23 recent proposal
24 results
25 secure compression functions
26 security
27 security analysis
28 security bounds
29 tight security bounds
30 schema:name Security Analysis of Constructions Combining FIL Random Oracles
31 schema:pagination 119-136
32 schema:productId N185c6ef4eadb496aa7bd4306b887b9dd
33 Nba86cc8366354994a9d1effa23ef1cba
34 schema:publisher Nc5554226e9ed4ec287ad0f3e0845f688
35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014901294
36 https://doi.org/10.1007/978-3-540-74619-5_8
37 schema:sdDatePublished 2022-12-01T06:49
38 schema:sdLicense https://scigraph.springernature.com/explorer/license/
39 schema:sdPublisher N9aa2a0daf0bd49278dc45d3b387b79b0
40 schema:url https://doi.org/10.1007/978-3-540-74619-5_8
41 sgo:license sg:explorer/license/
42 sgo:sdDataset chapters
43 rdf:type schema:Chapter
44 N185c6ef4eadb496aa7bd4306b887b9dd schema:name dimensions_id
45 schema:value pub.1014901294
46 rdf:type schema:PropertyValue
47 N485746e7a3844a45a0a931b7790014a5 rdf:first sg:person.011167161615.31
48 rdf:rest rdf:nil
49 N68b2692d32c44cab9b7fad2ccbd2affc schema:familyName Biryukov
50 schema:givenName Alex
51 rdf:type schema:Person
52 N73fe58426f0741e7b94a4262ccb69f83 schema:isbn 978-3-540-74617-1
53 978-3-540-74619-5
54 schema:name Fast Software Encryption
55 rdf:type schema:Book
56 N9aa2a0daf0bd49278dc45d3b387b79b0 schema:name Springer Nature - SN SciGraph project
57 rdf:type schema:Organization
58 Nabe67173a5134394ab11c43f2b144adb rdf:first N68b2692d32c44cab9b7fad2ccbd2affc
59 rdf:rest rdf:nil
60 Nba86cc8366354994a9d1effa23ef1cba schema:name doi
61 schema:value 10.1007/978-3-540-74619-5_8
62 rdf:type schema:PropertyValue
63 Nc437794aace64a27b8d5732d1f9cdd8a rdf:first sg:person.011724731171.01
64 rdf:rest N485746e7a3844a45a0a931b7790014a5
65 Nc5554226e9ed4ec287ad0f3e0845f688 schema:name Springer Nature
66 rdf:type schema:Organisation
67 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
68 schema:name Information and Computing Sciences
69 rdf:type schema:DefinedTerm
70 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
71 schema:name Data Format
72 rdf:type schema:DefinedTerm
73 sg:person.011167161615.31 schema:affiliation grid-institutes:grid.89485.38
74 schema:familyName Peyrin
75 schema:givenName Thomas
76 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011167161615.31
77 rdf:type schema:Person
78 sg:person.011724731171.01 schema:affiliation grid-institutes:grid.89485.38
79 schema:familyName Seurin
80 schema:givenName Yannick
81 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01
82 rdf:type schema:Person
83 grid-institutes:grid.89485.38 schema:alternateName France Telecom R&D, 38-40 rue du Général Leclerc, F-92794 Issy-les-Moulineaux, France, Université de Versailles, 45 avenue des Etats-Unis, F-78035 Versailles, France
84 schema:name France Telecom R&D, 38-40 rue du Général Leclerc, F-92794 Issy-les-Moulineaux, France, Université de Versailles, 45 avenue des Etats-Unis, F-78035 Versailles, France
85 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...