Paper 2008/441
How Risky is the Random-Oracle Model?
Gaetan Leurent and Phong Q. Nguyen
Abstract
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require
a hash function with output size larger than standard sizes.
We show that the random-oracle instantiations proposed in the literature for such cases
are weaker than a random oracle,
including the proposals by Bellare and Rogaway from 1993 and 1996,
and the ones implicit in IEEE P1363 and PKCS standards:
for instance, there is a practical
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Full version of the CRYPTO 2009 article.
- Keywords
- hash functionscryptanalysispublic-key cryptography
- Contact author(s)
- pnguyen @ di ens fr
- History
- 2009-07-23: last of 2 revisions
- 2008-10-20: received
- See all versions
- Short URL
- https://ia.cr/2008/441
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2008/441, author = {Gaetan Leurent and Phong Q. Nguyen}, title = {How Risky is the Random-Oracle Model?}, howpublished = {Cryptology {ePrint} Archive, Paper 2008/441}, year = {2008}, url = {https://eprint.iacr.org/2008/441} }