Boost logo

Boost :

From: Peter Dimov (pdimov_at_[hidden])
Date: 2024-12-09 14:23:35


Matt Borland wrote:
...
> > Note that while finding shortest vectors in a lattice is a very hard
> > problem as the dimension grows, here we don't really have to find
> > exceedingly short vectors; they must instead have either -1 (removal)
> > or positive coefficients. For collision-finding, where we control both
> > inputs, we can start with many repetitions of the same element to make
> > the problem easier and allow reasonably small negative coefficients as
> > well. See also [2, Appendix B].
> >
>
> > For larger sets, the generalized birthday attacks from Wagner [1,
> > Section 4] also should apply here with minimal modifications, and
> > reduces the security of an n-bit sum to O(2^{2sqrt(n)}).
> >
>
> > As far as I can tell the only successful multiset hashes either
> > require enormous moduli or use elliptic curves.
> >
>
> > [1] https://www.iacr.org/archive/crypto2002/24420288/24420288.pdf
> > [2] https://arxiv.org/pdf/1601.06502

Thanks Samuel, very informative.

> This is the correct answer. See also section 5.1 of NIST SP 800-107[1].
>
> Matt
>
> [1] https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-107r1.pdf

I'm not sure why hash truncation applies here; what Samuel is saying is
that this scheme for multiset hashing is insecure even if the original hash
is not truncated.

A 256 bit hash, for instance, would only provide (at most) 32 bit security.

For 64 bit security one would need a 1024 bit source hash, which seems
like an overkill to me.


Boost list run by bdawes at acm.org, gregod at cs.rpi.edu, cpdaniel at pacbell.net, john at johnmaddock.co.uk