Verified Security of Merkle-Damgård

Computer Security Foundations Symposium(2012)

引用 42|浏览2
暂无评分
摘要
Cryptographic hash functions provide a basic data authentication mechanism and are used pervasively as building blocks to realize many cryptographic functionalities, including block ciphers, message authentication codes, key exchange protocols, and encryption and digital signature schemes. Since weaknesses in hash functions may imply vulnerabilities in the constructions that build upon them, ensuring their security is essential. Unfortunately, many widely used hash functions, including SHA-1 and MD5, are subject to practical attacks. The search for a secure replacement is one of the most active topics in the field of cryptography. In this paper we report on the first machine-checked and independently-verifiable proofs of collision-resistance and in differentiability of Merkle-Damgaard, a construction that underlies many existing hash functions. Our proofs are built and verified using an extension of the Easy Crypt framework, which relies on state-of-the-art verification tools such as automated theorem provers, SMT solvers, and interactive proof assistants.
更多
查看译文
关键词
authorisation,cryptography,digital signatures,formal verification,theorem proving,easycrypt framework,md5 hash functions,merkle-damgard hash functions,sha-1 hash functions,smt solvers,automated theorem prover,block ciphers,collision resistance,cryptographic functionalities,cryptographic hash functions,data authentication,digital signature scheme,encryption,independently-verifiable proof,interactive proof assistant,key exchange protocols,machine-checked proof,message authentication codes,security verification,easy crypt,merkle-damgaard,sha-3,collision-resistance,indifferentiability,semantics,probabilistic logic,games,sha 3,resistance
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要