{"created":"2025-01-19T01:45:23.913361+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00240927","sets":["6164:6165:6462:11854"]},"path":["11854"],"owner":"11","recid":"240927","title":["SipHashの偽造攻撃に対する安全性評価"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2024-10-15"},"_buckets":{"deposit":"f86cdabf-79ba-4b20-b8f2-4b6c24262e45"},"_deposit":{"id":"240927","pid":{"type":"depid","value":"240927","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"SipHashの偽造攻撃に対する安全性評価","author_link":["662267","662268","662269","662270","662271","662272","662273","662274"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"SipHashの偽造攻撃に対する安全性評価","subitem_title_language":"ja"},{"subitem_title":"Security Evaluation of Siphash against Forgery Attacks","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"MAC,差分解析,最大差分特性確率,SAT ソルバー,偽造攻撃","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2024-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"兵庫県立大学"},{"subitem_text_value":"兵庫県立大学"},{"subitem_text_value":"三菱電機株式会社"},{"subitem_text_value":"兵庫県立大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"University of Hyogo","subitem_text_language":"en"},{"subitem_text_value":"University of Hyogo","subitem_text_language":"en"},{"subitem_text_value":"Mitsubishi Electric Corporation","subitem_text_language":"en"},{"subitem_text_value":"University of Hyogo","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/240927/files/IPSJ-CSS2024181.pdf","label":"IPSJ-CSS2024181.pdf"},"date":[{"dateType":"Available","dateValue":"2026-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2024181.pdf","filesize":[{"value":"479.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5906c045-5e26-482e-92c9-58a75d0e254c","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"佐々木, 皓亮"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"倉原, 陸斗"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"阪本, 光星"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"五十部, 孝典"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kosuke, Sasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Rikuto, Kurahara","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kosei, Sakamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takanori, Isobe","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本論文では,メッセージ認証コードであるSipHashの偽造攻撃に対する安全性評価を行う.既存の評価としては,Dobraunigらによって内部処理ラウンドを1ラウンドと2ラウンドに減らしたSipHash-1-xとSipHash-2-xに対する内部衝突の評価が実施されていた.本研究では,既存研究における探索範囲を拡張し,SipHash-1-xとSipHash-2-xのより厳密な評価とSipHash-3-xおよびSipHash-4-xまでの内部衝突の評価を実施する.具体的には,SATソルバーを用いた手法によって,これまで計算量の問題で探索範囲を限定していたSipHashの評価に対して全探索範囲による解析を行う.さらに,これまで評価のされていなかった最終化処理でのタグ衝突の安全性評価を初めて行う.結果として,内部衝突では既存の結果を更新し,タグ衝突ではSipHash-1-1, SipHash-1-0そしてSipHash-2-0において,偽造攻撃がランダムよりも高い確率で成功することを示す.これらは,ラウンドの削減されたSipHashに対する初めての偽造攻撃である. ","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In this paper, we evaluate the security of the message authentication code SipHash against forgery attacks. Existing evaluations by Dobraunig et al. focused on internal collisions for SipHash-1-x and SipHash-2-x, where the internal processing rounds were reduced to one and two rounds, respectively. In this paper, we extend the search space to provide a more rigorous evaluation of SipHash-1-x and SipHash-2-x, and we also evaluate internal collisions for SipHash-3-x and SipHash-4-x by using a method involving SAT solvers. Besides, we perform the first security evaluation of forget attacks exploiting tag collisions during the finalization process. As a result, we update existing results on internal collisions and demonstrate that forgery attacks using tag collisions are feasible for SipHash-1-1, SipHash-1-0, and SipHash-2-0. These findings represent the first forgery attacks against SipHash with reduced rounds.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1361","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2024論文集"}],"bibliographicPageStart":"1354","bibliographicIssueDates":{"bibliographicIssueDate":"2024-10-15","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":240927,"updated":"2025-03-06T05:57:11.552142+00:00","links":{}}