126
v1v2 (latest)

Compactness of Hashing Modes and Efficiency beyond Merkle Tree

IACR Cryptology ePrint Archive (IACR ePrint), 2021
Abstract

We revisit the classical problem of designing optimally efficient cryptographically secure hash functions. Hash functions are traditionally designed via applying modes of operation on primitives with smaller domains. The results of Shrimpton and Stam (ICALP 2008), Rogaway and Steinberger (CRYPTO 2008), and Mennink and Preneel (CRYPTO 2012) show how to achieve optimally efficient designs of 2n2n-to-nn-bit compression functions from non-compressing primitives with asymptotically optimal 2n/2ϵ2^{n/2-\epsilon}-query collision resistance. Designing optimally efficient and secure hash functions for larger domains (>2n> 2n bits) is still an open problem. In this work we propose the new \textit{compactness} efficiency notion. It allows us to focus on asymptotically optimally collision resistant hash function and normalize their parameters based on Stam's bound from CRYPTO 2008 to obtain maximal efficiency. We then present two tree-based modes of operation -Our first construction is an \underline{A}ugmented \underline{B}inary T\underline{r}ee (ABR) mode. The design is a (2+211)n(2^{\ell}+2^{\ell-1} -1)n-to-nn-bit hash function making a total of (21)(2^{\ell}-1) calls to 2n2n-to-nn-bit compression functions for any 2\ell\geq 2. Our construction is optimally compact with asymptotically (optimal) 2n/2ϵ2^{n/2-\epsilon}-query collision resistance in the ideal model. For a tree of height \ell, in comparison with Merkle tree, the ABRABR mode processes additional (211)(2^{\ell-1}-1) data blocks making the same number of internal compression function calls. -While the ABRABR mode achieves collision resistance, it fails to achieve indifferentiability from a random oracle within 2n/32^{n/3} queries. ABR+ABR^{+} compresses only 11 less data block than ABRABR with the same number of compression calls and achieves in addition indifferentiability up to 2n/2ϵ2^{n/2-\epsilon} queries.

View on arXiv
Comments on this paper