International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications

Authors:
Stefan Kölbl , DTU Compute, Technical University of Denmark
Martin M. Lauridsen , InfoSec Global Ltd.
Florian Mendel , IAIK, Graz University of Technology
Christian Rechberger , DTU Compute, Technical University of Denmark; IAIK, Graz University of Technology
Download:
DOI: 10.13154/tosc.v2016.i2.1-29
URL: http://tosc.iacr.org/index.php/ToSC/article/view/563
Search ePrint
Search Google
Abstract: Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs. However, various applications exist where the performance on short (fixed length) inputs matters more. Such hash functions are the bottleneck in hash-based signature schemes like SPHINCS or XMSS, which is currently under standardization. Secure functions specifically designed for such applications are scarce. We attend to this gap by proposing two short-input hash functions (or rather simply compression functions). By utilizing AES instructions on modern CPUs, our proposals are the fastest on such platforms, reaching throughputs below one cycle per hashed byte even for short inputs, while still having a very low latency of less than 60 cycles. Under the hood, this results comes with several innovations. First, we study whether the number of rounds for our hash functions can be reduced, if only second-preimage resistance (and not collision resistance) is required. The conclusion is: only a little. Second, since their inception, AES-like designs allow for supportive security arguments by means of counting and bounding the number of active S-boxes. However, this ignores powerful attack vectors using truncated differentials, including the powerful rebound attacks. We develop a general tool-based method to include arguments against attack vectors using truncated differentials.
BibTeX
@article{tosc-2016-28116,
  title={Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications},
  journal={IACR Trans. Symmetric Cryptol.},
  publisher={Ruhr-Universität Bochum},
  volume={2016, Issue 2},
  pages={1-29},
  url={http://tosc.iacr.org/index.php/ToSC/article/view/563},
  doi={10.13154/tosc.v2016.i2.1-29},
  author={Stefan Kölbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger},
  year=2016
}