hashing Flashcards

1
Q

universal one-way hash function

A

In cryptography a universal one-way hash function (UOWHF, often pronounced “woof”), is a type of universal hash function of particular importance to cryptography. UOWHF’s are proposed as an alternative to collision-resistant hash functions (CRHFs). CRHFs have a strong collision-resistance property: that it is hard, given randomly chosen hash function parameters, to find any collision of the hash function. In contrast, UOWHFs require that it be hard to find a collision where one preimage is chosen independently of the hash function parameters. The primitive was suggested by Moni Naor and Moti Yung and is also known as “target collision resistant” hash functions; it was employed to construct general digital signature schemes without trapdoor functions, and also within chosen-ciphertext secure public key encryption schemes.

The UOWHF family contains a finite number of hash functions with each having the same probability of being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The security property of a UOWHF is as follows

A

Let A be an algorithm that operates in two phases:

Initially, A receives no input (or, just a security parameter) and chooses a value x.
A hash function H is chosen randomly from the family. A then receives H and must output y not equal x such that H(x)=H(y).
Then for all polynomial-time A the probability that A succeeds is negligible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Universal One Waz Hash Function Applications

A

UOWHFs are thought to be less computationally expensive than CRHFs, and are most often used for efficiency purposes in schemes where the choice of the hash function happens at some stage of execution, rather than beforehand. For instance, the Cramer–Shoup cryptosystem uses a UOWHF as part of the validity check in its ciphertexts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preimage attack

A

In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash function should resist attacks on its preimage (set of possible inputs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preimage resistance

A

for essentially all pre-specified outputs, it is computationally infeasible to find any input that hashes to that output; i.e., given y, it is difficult to find an x such that h(x) = y.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

second-preimage resistance:

A

for a specified input, it is computationally infeasible to find another input which produces the same output; i.e., given x, it is difficult to find a second input x′ ≠ x such that h(x) = h(x′)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Collision resistance implies

A

second-preimage resistance, but does not guarantee preimage resistance.Conversely, a second-preimage attack implies a collision attack (trivially, since, in addition to x′, x is already known right from the start).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly