<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-03-06T15:14:20Z</responseDate>
  <request metadataPrefix="jpcoar_1.0" verb="GetRecord" identifier="oai:ipsj.ixsq.nii.ac.jp:00240927">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00240927</identifier>
        <datestamp>2025-03-06T05:57:11Z</datestamp>
        <setSpec>6164:6165:6462:11854</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title xml:lang="ja">SipHashの偽造攻撃に対する安全性評価</dc:title>
          <dc:title xml:lang="en">Security Evaluation of Siphash against Forgery Attacks</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>佐々木, 皓亮</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>倉原, 陸斗</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>阪本, 光星</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>五十部, 孝典</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Kosuke, Sasaki</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Rikuto, Kurahara</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Kosei, Sakamoto</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Takanori, Isobe</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">MAC，差分解析，最大差分特性確率，SAT ソルバー，偽造攻撃</jpcoar:subject>
          <datacite:description descriptionType="Other">本論文では，メッセージ認証コードであるSipHashの偽造攻撃に対する安全性評価を行う．既存の評価としては，Dobraunigらによって内部処理ラウンドを1ラウンドと2ラウンドに減らしたSipHash-1-xとSipHash-2-xに対する内部衝突の評価が実施されていた．本研究では，既存研究における探索範囲を拡張し，SipHash-1-xとSipHash-2-xのより厳密な評価とSipHash-3-xおよびSipHash-4-xまでの内部衝突の評価を実施する．具体的には，SATソルバーを用いた手法によって，これまで計算量の問題で探索範囲を限定していたSipHashの評価に対して全探索範囲による解析を行う．さらに，これまで評価のされていなかった最終化処理でのタグ衝突の安全性評価を初めて行う．結果として，内部衝突では既存の結果を更新し，タグ衝突ではSipHash-1-1, SipHash-1-0そしてSipHash-2-0において，偽造攻撃がランダムよりも高い確率で成功することを示す．これらは，ラウンドの削減されたSipHashに対する初めての偽造攻撃である.</datacite:description>
          <datacite:description descriptionType="Other">In this paper, we evaluate the security of the message authentication code SipHash against forgery attacks. Existing evaluations by Dobraunig et al. focused on internal collisions for SipHash-1-x and SipHash-2-x, where the internal processing rounds were reduced to one and two rounds, respectively. In this paper, we extend the search space to provide a more rigorous evaluation of SipHash-1-x and SipHash-2-x, and we also evaluate internal collisions for  SipHash-3-x and SipHash-4-x by using a method involving SAT solvers. Besides, we perform the first security evaluation of forget attacks exploiting tag collisions during the finalization process. As a result, we update existing results on internal collisions and demonstrate that forgery attacks using tag collisions are feasible for SipHash-1-1, SipHash-1-0, and SipHash-2-0. These findings represent the first forgery attacks against SipHash with reduced rounds.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2024-10-15</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_5794">conference paper</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/240927</jpcoar:identifier>
          <jpcoar:sourceTitle>コンピュータセキュリティシンポジウム2024論文集</jpcoar:sourceTitle>
          <jpcoar:pageStart>1354</jpcoar:pageStart>
          <jpcoar:pageEnd>1361</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJ-CSS2024181.pdf">https://ipsj.ixsq.nii.ac.jp/record/240927/files/IPSJ-CSS2024181.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>479.6 kB</jpcoar:extent>
            <datacite:date dateType="Available">2026-10-15</datacite:date>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
