Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

N-hash

From Wikipedia, the free encyclopedia
Cryptographic hash function
N-hash
General
DesignersS. Miyaguchi
K. Ohta
M. Iwata
First published1990
Derived fromFEAL
Detail
Digest sizes128 bits
StructureIterated hash function
Rounds8

Incryptography,N-hash is acryptographic hash function based on theFEAL round function, and is now considered insecure. It was proposed in 1990 in an article by Miyaguchi, Ohta, and Iwata;[1] weaknesses were published the following year.[2]

N-hash has a 128-bit hash size. A message is divided into 128-bit blocks, and each block is combined with the hash value computed so far using thegcompression function.g contains eight rounds, each of which uses anF function, similar to the one used byFEAL.

Eli Biham andAdi Shamir (1991) applied the technique ofdifferential cryptanalysis to N-hash, and showed thatcollisions could be generated faster than by abirthday attack for N-hash variants with even up to 12 rounds.[2]

Design

[edit]

N-hash follows an earlyblock cipher–based approach tocryptographic hash function design, in which thecompression function is constructed from a cipher-likeround function rather than from a dedicated hash-specific primitive. Such designs were common in the late 1980s and early 1990s, prior to the widespread adoption of purpose-built hash functions.[3][4][5] Thechaining mechanism of N-hash combines the output of the round function with both the current message block and the previoushash state. This structure was later studied in the context of genericblock cipher–based hash constructions and their resistance to knowncryptanalytic techniques.[2][6]

Cryptanalysis

[edit]

The cryptanalysis of N-hash highlighted the risks of directly reusingblock cipher components in hash function design without sufficient security margins. Attacks on N-hash demonstrated that structural properties exploitable inencryption algorithms could also underminecollision resistance when applied in a hashing context.[2][7][8] As a result of these findings, N-hash was never adopted in practical cryptographic applications. It is cited primarily in academic literature as an early example that influenced later research into secure hash function construction and the separation of design principles for encryption and hashing.[9]

References

[edit]
  1. ^Miyaguchi, S.; Ohta, K.; Iwata, M. (November 1990). "128-bit hash function (N-hash)".NTT Review.2 (6):128–132.
  2. ^abcdBiham, Eli; Shamir, Adi (1991). "Differential Cryptanalysis of Feal and N-Hash". In Davies, Donald W. (ed.).Advances in Cryptology — EUROCRYPT '91. Lecture Notes in Computer Science. Vol. 547. Berlin, Heidelberg: Springer. pp. 1–16.doi:10.1007/3-540-46416-6_1.ISBN 978-3-540-54620-7.
  3. ^Preneel, Bart (1993).Analysis and Design of Cryptographic Hash Functions(PDF) (PhD dissertation).Katholieke Universiteit Leuven. Archived fromthe original(PDF) on 2024-04-22. Retrieved2025-12-22.
  4. ^Ismailova, R. (2012).Block Cipher Based Hashed Functions(PDF) (PhD thesis).Middle East Technical University. Retrieved2025-12-22.
  5. ^Thomsen, S. S. (2012).Cryptographic Hash Functions(PDF) (PhD thesis).Technical University of Denmark. Archived fromthe original(PDF) on 2019-02-25. Retrieved2025-12-22.
  6. ^Danda, M. K. R. (2007).Design and Analysis of Hash Functions(PDF) (PhD thesis).Victoria University. Archived fromthe original(PDF) on 2025-03-21. Retrieved2025-12-22.
  7. ^Khovratovich, Dmitry (2009)."Cryptanalysis of Hash Functions with Structures". In Jacobson, M. J.; Rijmen, V.; Safavi-Naini, R. (eds.).Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 5867. Berlin, Heidelberg: Springer. pp. 108–125.doi:10.1007/978-3-642-05445-7_7.ISBN 978-3-642-05443-3. Archived fromthe original on 18 June 2018.
  8. ^Phan, Raphael C.-W.; Aumasson, Jean-Philippe (2009)."On Hashing With Tweakable Ciphers"(PDF).2009 IEEE International Conference on Communications. IEEE. pp. 1–5.doi:10.1109/ICC.2009.5199240. Archived fromthe original(PDF) on 2025-04-16. Retrieved2025-12-22.
  9. ^Lai, Xucjia; Massey, James L. (1993)."Hash Functions Based on Block Ciphers". In Rueppel, Rainer A. (ed.).Advances in Cryptology — EUROCRYPT' 92. Lecture Notes in Computer Science. Vol. 658. Berlin, Heidelberg: Springer. pp. 55–70.doi:10.1007/3-540-47555-9_5.ISBN 978-3-540-47555-2. Archived fromthe original on 2023-10-08.
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics
Stub icon

This cryptography-related article is astub. You can help Wikipedia byadding missing information.

Retrieved from "https://en.wikipedia.org/w/index.php?title=N-hash&oldid=1332739777"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp