The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography
暫譯: 雜湊函數與隨機預言的理論:現代密碼學的方法
Mittelbach, Arno, Fischlin, Marc
相關主題
商品描述
Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption schemes. In this book the authors take a different approach and place hash functions at the center. The result is not only an introduction to the theory of hash functions and the random oracle model but a comprehensive introduction to modern cryptography.
After motivating their unique approach, in the first chapter the authors introduce the concepts from computability theory, probability theory, information theory, complexity theory, and information-theoretic security that are required to understand the book content. In Part I they introduce the foundations of hash functions and modern cryptography. They cover a number of schemes, concepts, and proof techniques, including computational security, one-way functions, pseudorandomness and pseudorandom functions, game-based proofs, message authentication codes, encryption schemes, signature schemes, and collision-resistant (hash) functions. In Part II the authors explain the random oracle model, proof techniques used with random oracles, random oracle constructions, and examples of real-world random oracle schemes. They also address the limitations of random oracles and the random oracle controversy, the fact that uninstantiable schemes exist which are provably secure in the random oracle model but which become insecure with any real-world hash function. Finally in Part III the authors focus on constructions of hash functions. This includes a treatment of iterative hash functions and generic attacks against hash functions, constructions of hash functions based on block ciphers and number-theoretic assumptions, a discussion of privately keyed hash functions including a full security proof for HMAC, and a presentation of real-world hash functions.
The text is supported with exercises, notes, references, and pointers to further reading, and it is a suitable textbook for undergraduate and graduate students, and researchers of cryptology and information security.
商品描述(中文翻譯)
哈希函數是密碼學家的瑞士軍刀。儘管它們在當今的密碼學中扮演著不可或缺的角色,但現有的教科書僅僅是略微提及哈希函數,反而常常強調其他原語,如加密方案。在本書中,作者採取了不同的方式,將哈希函數置於中心。其結果不僅是對哈希函數理論和隨機預言模型的介紹,還是對現代密碼學的全面介紹。
在激勵其獨特方法之後,第一章中,作者介紹了計算理論、概率論、信息論、複雜性理論和信息理論安全性所需的概念,以便理解本書內容。在第一部分中,他們介紹了哈希函數和現代密碼學的基礎。他們涵蓋了多種方案、概念和證明技術,包括計算安全性、單向函數、偽隨機性和偽隨機函數、基於遊戲的證明、消息認證碼、加密方案、簽名方案以及抗碰撞(哈希)函數。在第二部分中,作者解釋了隨機預言模型、與隨機預言相關的證明技術、隨機預言的構造以及現實世界隨機預言方案的例子。他們還討論了隨機預言的局限性和隨機預言爭議,即存在一些無法實現的方案,這些方案在隨機預言模型中是可證明安全的,但在任何現實世界的哈希函數下則變得不安全。最後,在第三部分中,作者專注於哈希函數的構造。這包括對迭代哈希函數和針對哈希函數的通用攻擊的處理,基於區塊加密和數論假設的哈希函數構造,對私鑰哈希函數的討論,包括對HMAC的完整安全證明,以及現實世界哈希函數的介紹。
本書附有練習題、註釋、參考文獻和進一步閱讀的指引,適合作為本科生和研究生的教科書,以及密碼學和信息安全研究人員的參考資料。