Cryptanalysis of a Cayley Hash Function Based on Affine Maps in one Variable over a Finite Field
- URL: http://arxiv.org/abs/2308.15765v3
- Date: Mon, 4 Sep 2023 18:16:23 GMT
- Title: Cryptanalysis of a Cayley Hash Function Based on Affine Maps in one Variable over a Finite Field
- Authors: Bianca Sosnovski,
- Abstract summary: Cayley hash functions are cryptographic hashes constructed from Cayley graphs of groups.
The hash function proposed by Shpilrain and Sosnovski, based on linear functions over a finite field, was proven insecure.
This paper shows that the proposal by Ghaffari and Mostmaghi that uses the hash in its construction is also insecure.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cayley hash functions are cryptographic hashes constructed from Cayley graphs of groups. The hash function proposed by Shpilrain and Sosnovski (2016), based on linear functions over a finite field, was proven insecure. This paper shows that the proposal by Ghaffari and Mostaghim (2018) that uses the Shpilrain and Sosnovski's hash in its construction is also insecure. We demonstrate its security vulnerability by constructing collisions.
Related papers
- Error Correction Capabilities of Non-Linear Cryptographic Hash Functions [56.368766255147555]
Linear hashes are known to possess error-correcting capabilities.
In most applications, non-linear hashes with pseudorandom outputs are utilized instead.
We show that non-linear hashes might also exhibit good error-correcting capabilities.
arXiv Detail & Related papers (2024-05-02T17:26:56Z) - Automated Quantum Circuit Generation for Computing Inverse Hash Functions [0.29998889086656577]
Several cryptographic systems depend upon the computational difficulty of reversing cryptographic hash functions.
Hash functions can be cryptographically secure, and they are employed in encryption, authentication, and other security methods.
It has been suggested that such cryptographically-secure hash functions will play a critical role in the era of post-quantum cryptography.
arXiv Detail & Related papers (2024-04-26T03:55:46Z) - Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations [49.1574468325115]
Sponge hashing is a widely used class of cryptographic hash algorithms.
Intrepid permutations have so far remained a fundamental open problem.
We show that finding zero-pairs in a random $2n$-bit permutation requires at least $Omega (2n/2)$ many queries.
arXiv Detail & Related papers (2024-03-07T18:46:58Z) - Cayley hashing with cookies [0.0]
Cayley hash functions are based on a simple idea of using a pair of semigroup elements, A and B, to hash the 0 and 1 bit.
In this paper, we offer a way to get rid of this alleged disadvantage and keep the advantages at the same time.
arXiv Detail & Related papers (2024-02-07T15:22:17Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$ [0.0]
We define new families of Tillich-Z'emor hash functions, using higher dimensional special linear groups over finite fields as platforms.
Cayley graphs of these groups combine fast mixing properties and high girth, which together give rise to good preimage and collision resistance of the corresponding hash functions.
arXiv Detail & Related papers (2022-07-08T16:15:11Z) - Self-Distilled Hashing for Deep Image Retrieval [25.645550298697938]
In hash-based image retrieval systems, transformed input from the original usually generates different codes.
We propose a novel self-distilled hashing scheme to minimize the discrepancy while exploiting the potential of augmented data.
We also introduce hash proxy-based similarity learning and binary cross entropy-based quantization loss to provide fine quality hash codes.
arXiv Detail & Related papers (2021-12-16T12:01:50Z) - Quantum collision finding for homomorphic hash functions [0.0]
We present concrete attack examples to provable hash functions, including a preimage attack to $oplus$-linear hash functions.
Hash functions which are additive or multiplicative are vulnerable to a quantum attack using the hidden subgroup problem algorithm for quantum computers.
arXiv Detail & Related papers (2021-07-30T23:01:02Z) - CIMON: Towards High-quality Hash Codes [63.37321228830102]
We propose a new method named textbfComprehensive stextbfImilarity textbfMining and ctextbfOnsistency leartextbfNing (CIMON)
First, we use global refinement and similarity statistical distribution to obtain reliable and smooth guidance. Second, both semantic and contrastive consistency learning are introduced to derive both disturb-invariant and discriminative hash codes.
arXiv Detail & Related papers (2020-10-15T14:47:14Z) - Reinforcing Short-Length Hashing [61.75883795807109]
Existing methods have poor performance in retrieval using an extremely short-length hash code.
In this study, we propose a novel reinforcing short-length hashing (RSLH)
In this proposed RSLH, mutual reconstruction between the hash representation and semantic labels is performed to preserve the semantic information.
Experiments on three large-scale image benchmarks demonstrate the superior performance of RSLH under various short-length hashing scenarios.
arXiv Detail & Related papers (2020-04-24T02:23:52Z) - Targeted Attack for Deep Hashing based Retrieval [57.582221494035856]
We propose a novel method, dubbed deep hashing targeted attack (DHTA), to study the targeted attack on such retrieval.
We first formulate the targeted attack as a point-to-set optimization, which minimizes the average distance between the hash code of an adversarial example and those of a set of objects with the target label.
To balance the performance and perceptibility, we propose to minimize the Hamming distance between the hash code of the adversarial example and the anchor code under the $ellinfty$ restriction on the perturbation.
arXiv Detail & Related papers (2020-04-15T08:36:58Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.