TY - GEN
T1 - On the indifferentiability of Fugue and Luffa
AU - Bhattacharyya, Rishiraj
AU - Mandal, Avradip
PY - 2011
Y1 - 2011
N2 - Indifferentiability is currently considered to be an important security notion for a cryptographic hash function to instantiate Random Oracles in different security proofs. In this paper, we prove indifferentiability of Fugue and Luffa, two SHA3 second round candidates. We also analyze the indifferentiability of a modified Luffa mode replacing multiple small permutations by a single large permutation. Our technique is quite general and can be applicable to any sponge based design which uses affine function for message insertion. To the best of our knowledge, our result for Luffa is the first indifferentiability analysis of a mode of operation based on variable (more than two) number of small permutations.
AB - Indifferentiability is currently considered to be an important security notion for a cryptographic hash function to instantiate Random Oracles in different security proofs. In this paper, we prove indifferentiability of Fugue and Luffa, two SHA3 second round candidates. We also analyze the indifferentiability of a modified Luffa mode replacing multiple small permutations by a single large permutation. Our technique is quite general and can be applicable to any sponge based design which uses affine function for message insertion. To the best of our knowledge, our result for Luffa is the first indifferentiability analysis of a mode of operation based on variable (more than two) number of small permutations.
KW - Fugue
KW - Hash function
KW - Indifferentiability
KW - Luffa
UR - http://www.scopus.com/inward/record.url?scp=79959308010&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-21554-4_28
DO - 10.1007/978-3-642-21554-4_28
M3 - Conference contribution
AN - SCOPUS:79959308010
SN - 9783642215537
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 479
EP - 497
BT - Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Proceedings
T2 - 9th International Conference on Applied Cryptography and Network Security, ACNS 2011
Y2 - 7 June 2011 through 10 June 2011
ER -