SLIDE 110 Introduction MD New Results I New Results II Future Alternatives Design Permutation Proofs SHA3
Other Provable Compression Functions
◮ An interesting approach is the DAKOTA construction
[DKT08] also inspired by [D87].
◮ Let f : {0, 1}m → QR(n), where n is a number whose
factorization is unknown.
◮ To compress the input (mi, hi):
hi+1 = f (mi) · h2
i ,
where h0 ∈ QR(n).
◮ This is secure as long as finding (b, y), (b′, y ′) s.t.
f (b)f −1(b′) = y ′y −1 mod n is hard.
◮ It is also possible to use a random f (·):
hi+1 = (f (mi) · hi)2.
◮ If the assumption holds, then the security proof holds.
Orr Dunkelman Hash Functions — Much Ado about Something 58/ 69