• Aucun résultat trouvé

Hash functions based on the syndrome decoding problem

N/A
N/A
Protected

Academic year: 2021

Partager "Hash functions based on the syndrome decoding problem"

Copied!
2
0
0

Texte intégral

(1)

Hash functions based on the syndrome decoding problem

For one student Domain

Cryptography and coding theory

Presentation

In cryptography, the Fast Syndrome-based hash Functions (FSB) are a family of cryptographic hash functions introduced in 2003 by Daniel Augot, Matthieu Finiasz, and Nicolas Sendrier. Unlike most other cryptographic hash functions in use today, FSB can to a certain extent be proven to be secure. More exactly, it can be proven that breaking FSB is at least as dicult as solving a certain NP-complete problem known as Regular Syndrome Decoding. We call function with these properties provably secure. Though it is not known whether NP-complete problems are solvable in polynomial time, it is often assumed that they are not. Several versions of FSB have been proposed, the latest of which was submitted to the SHA-3 cryptography competition but was rejected in the rst round. Though all versions of FSB claim provable security, some preliminary versions were eventually broken. The design of the latest version of FSB has however taken this attack into account and remains secure to all currently known attacks. As usual, provably security does come at a cost. FSB is slower than traditional hash functions and uses quite a lot of memory, which makes it impractical on memory constrained environments. Furthermore, the compression function used in FSB needs a large output size to guarantee security.

Recently, Bernstein et al. introduces a new design for FSB which permits to reach the speed of 2 of the 5 SHA-3 nalists.

Purpose

The purpose of the thesis is to understand the recent improvements in the design of hash functions based on the syndrome decoding problem and design/implement an improved code- based stream cipher.

The students will have to write an article on his research in a L

A

TEX format and give an English presentation to the team.

Goals

The outcome of the thesis is supposed to be a publishable result on code-based secret key cryp- tosystem.

Required Skills

The required skills, in order of importance, are:

(2)

ˆ High motivation and creativity;

ˆ Some experience in L

A

TEX;

ˆ Skills in C, Java, (CUDA would be better);

ˆ Good knowledge of cryptographic constructions;

ˆ Experience with reading research papers.

Knowledge of the English language goes without saying.

Bibliography

[1] - 2008. Daniel Augot, Matthieu Finiasz, Philippe Gaborit, Stéphane Manuel, and Nicolas Sendrier. "SHA-3 proposal: FSB", Submission to the SHA3 NIST competition, 2008

[2] - 2011. Daniel J. Bernstein, Tanja Lange, Christiane Peters and Peter Schwabe. "Really fast syndrome-based hashing"

[3] - 2007. Eli Biham and Orr Dunkelman. "A Framework for Iterative Hash Functions HAIFA"

Institute

Laboratoire Hubert Curien : http://laboratoirehubertcurien.fr/spip.php?rubrique29

Place : Saint-Etienne - France

Team : Applied Cryptography and Telecom

Thesis supervisor : Pierre-Louis Cayrel (Maître de conférences)

Contact

If you are interested, please contact Pierre-Louis Cayrel Laboratoire Hubert Curien, UMR CNRS 5516

Bâtiment F 18 rue du professeur Benoît Lauras 42000 Saint-Etienne France

Phone: 0033-4 77 91 57 94

e-mail supervisor: pierre.louis.cayrel@univ-st-etienne.fr

web : http://www.cayrel.net/

Références

Documents relatifs

12-round differential trail for the Rijndael-based compression function with the 320-bit message block and the 160-bit internal state (Rijndael-hash 320/160).. 3.3 Second

As the additional inputs to the compression function, LAKE uses a ran- dom value (also called salt) and an index value, which counts the number of bits/blocks in the input

KEYWORDS : NP-complete, One-way function, Matrix of zeros and ones, Three-dimensional contin- gency table, Collision-resistant hash

Keywords: cryptographic hash functions, provable security, syndrome decod- ing, NP-completeness, Wagner’s generalized birthday problem..

randomness properties in graphs and hypergraphs (generalized cuckoo hashing [30], also in the version with a “stash” [35], or load balancing [5, 52]), a hash class combining k

The work needed for these attacks depends on the number of intermediate hash values of the target message, as this determines the work needed to find a linking message from

We follow and analyze the properties of the dithering sequence used in Rivest’s hash function proposal, and develop a time-memory tradeoff which allows us to apply our

the following vehicle, besides the vehicle dynamic modeling, a intelligent control structure was designed for it, which includes a two-level longitudinal controller for maintenance of