TY - GEN

T1 - A mathematical problem for security analysis of hash functions and pseudorandom generators

AU - Nuida, Koji

AU - Abe, Takuro

AU - Kaji, Shizuo

AU - Maeno, Toshiaki

AU - Numata, Yasuhide

N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.

PY - 2011

Y1 - 2011

N2 - The aim of this paper is to emphasize the significance of a certain mathematical problem in research on information security. We point out that the mathematical problem, which we refer to as "Function Density Problem," has connections to the following two major cryptographic topics; security analysis of hash functions in the real world (like SHA-1), and construction of pseudorandom generators with some enhanced security property. We also provide a first example to show how a study of Function Density Problem can contribute to the progress of the above-mentioned two topics. Other potential applications of Function Density Problem to information security are also discussed.

AB - The aim of this paper is to emphasize the significance of a certain mathematical problem in research on information security. We point out that the mathematical problem, which we refer to as "Function Density Problem," has connections to the following two major cryptographic topics; security analysis of hash functions in the real world (like SHA-1), and construction of pseudorandom generators with some enhanced security property. We also provide a first example to show how a study of Function Density Problem can contribute to the progress of the above-mentioned two topics. Other potential applications of Function Density Problem to information security are also discussed.

UR - http://www.scopus.com/inward/record.url?scp=80455168578&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80455168578&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-25141-2_10

DO - 10.1007/978-3-642-25141-2_10

M3 - Conference contribution

AN - SCOPUS:80455168578

SN - 9783642251405

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 144

EP - 160

BT - Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Proceedings

T2 - 6th International Workshop on Security, IWSEC 2011

Y2 - 8 November 2011 through 10 November 2011

ER -