Quantum security of hash functions and property-preservation of iterated hashing

02/23/2019
by   Ben Hamlin, et al.
0

This work contains two major parts: comprehensively studying the security notions of cryptographic hash functions against quantum attacks and the relationships between them; and revisiting whether Merkle-Damgard and related iterated hash constructions preserve the security properties of the compression function in the quantum setting. Specifically, we adapt the seven notions in Rogaway and Shrimpton (FSE'04) to the quantum setting and prove that the seemingly stronger attack model where an adversary accesses a challenger in quantum superposition does not make a difference. We confirm the implications and separations between the seven properties in the quantum setting, and in addition we construct explicit examples separating an inherently quantum notion called collapsing from several proposed properties. Finally, we pin down the properties that are preserved under several iterated hash schemes. In particular, we prove that the ROX construction in Andreeva et al. (Asiacrypt'07) preserves the seven properties in the quantum random oracle model.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/30/2021

Quantum collision finding for homomorphic hash functions

Hash functions are a basic cryptographic primitive. Certain hash functio...
research
03/10/2018

Quantum-secure message authentication via blind-unforgeability

We consider the problem of unforgeable authentication of classical messa...
research
07/12/2021

Weakened Random Oracle Models with Target Prefix

Weakened random oracle models (WROMs) are variants of the random oracle ...
research
10/27/2022

Quantum security of subset cover problems

The subset cover problem for k ≥ 1 hash functions, which can be seen as ...
research
08/10/2023

Quantum-inspired Hash Function Based on Parity-dependent Quantum Walks with Memory

In this paper, we develop a generic controlled alternate quantum walk mo...
research
02/22/2022

Applying Grover's Algorithm to Hash Functions: A Software Perspective

Quantum software frameworks provide software engineers with the tools to...
research
01/13/2021

Crooked Indifferentiability Revisited

In CRYPTO 2018, Russell et al introduced the notion of crooked indiffere...

Please sign up or login with your details

Forgot password? Click here to reset