NIST logo

Publication Citation: Improved Indifferentiability Security Bound for the JH Mode

NIST Authors in Bold

Author(s): Dustin Moody; Daniel Smith; Souradyuti Paul;
Title: Improved Indifferentiability Security Bound for the JH Mode
Published: May 16, 2012
Abstract: Indi fferentiability security of a hash mode of operation guarantees the mode's resistance against all generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function is one of the fi ve fi nalists in the ongoing NIST SHA-3 hash function competition. Despite several years of analysis, the indiff erentiability security of the JH mode (with n-bit digest and 2n-bit permutation) has remained remarkably low, only at n/3 bits (FSE 2010), while the other four finalist modes (with comparable parameter values) off er a security guarantee of n/2 bits. In this paper, we improve the indi fferentiability security bound for the JH mode to n/2 bits (e.g. from 171 to 256 bits when n = 512). To put this into perspective, our result guarantees the absence of attacks on both JH-256 and JH-512 hash functions with time less than approximately 2^256 computations of the underlying 1024-bit permutation, under the assumption that the basic permutation is structurally strong. Our bounds are optimal for JH-256, and the best, so far, for JH-512. We obtain this improved bound by establishing an isomorphism of certain query-response graphs through a careful design of the simulators and the bad events. Our experimental data strongly supports the theoretically obtained results.
Citation: Cryptology ePrint Archive
Website: http://eprint.iacr.org/2012/278
Keywords: Hash modes; JH; indifferentiability
Research Areas: Math
PDF version: PDF Document Click here to retrieve PDF version of paper (1MB)