International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms

Authors:
Mihir Bellare
Thomas Ristenpart
Download:
URL: http://eprint.iacr.org/2007/271
Search ePrint
Search Google
Abstract: In the dedicated-key setting, one starts with a compression function f:{0,1}^k x {0,1}^{n+d} -> {0,1}^n and builds a family of hash functions H^f:K x M -> {0,1}^n indexed by a key space K. This is different from the more traditional design approach used to build hash functions such as MD5 or SHA-1, in which compression functions and hash functions do not have dedicated key inputs. We explore the benefits and drawbacks of building hash functions in the dedicated-key setting (as compared to the more traditional approach), highlighting several unique features of the former. Should one choose to build hash functions in the dedicated-key setting, we suggest utilizing multi-property-preserving (MPP) domain extension transforms. We analyze seven existing dedicated-key transforms with regard to the MPP goal and propose two simple new MPP transforms.
BibTeX
@misc{eprint-2007-13552,
  title={Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms},
  booktitle={IACR Eprint archive},
  keywords={hash functions, dedicated keys, multi-property-preserving transforms},
  url={http://eprint.iacr.org/2007/271},
  note={A preliminary version appears in ICALP 2007 tristenp@cs.ucsd.edu 13804 received 12 Jul 2007, last revised 18 Oct 2007},
  author={Mihir Bellare and Thomas Ristenpart},
  year=2007
}