HOME

TheInfoList



OR:

The claw finding problem is a classical problem in complexity theory, with several applications in
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
. In short, given two functions ''f'', ''g'', viewed as
oracles An oracle is a person or agency considered to provide wise and insightful counsel or prophetic predictions, most notably including precognition of the future, inspired by deities. As such, it is a form of divination. Description The word '' ...
, the problem is to find ''x'' and ''y'' such as ''f''(''x'') = ''g''(''y''). The pair (''x'', ''y'') is then called a ''claw''. Some problems, especially in cryptography, are best solved when viewed as a claw finding problem, hence any algorithmic improvement to solving the claw finding problem provides a better attack on cryptographic primitives such as
hash function A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called ''hash values'', ''hash codes'', ''digests'', or simply ''hashes''. The values are usually ...
s.


Definition

Let A, B, C be finite sets, and f: A \to C, g: B \to C two functions. A pair (x,y) \in A \times B is called a ''claw'' if f(x) = g(y). The claw finding problem is defined as to find such a claw, given that one exists. If we view f, g as random functions, we expect a claw to exist iff , A, \cdot , B, \geq , C, . More accurately, there are exactly , A, \cdot , B, pairs of the form (x,y) with x \in A, y \in B; the probability that such a pair is a claw is 1/, C, . So if , A, \cdot , B, \geq , C, , the
expected number In probability theory, the expected value (also called expectation, expectancy, mathematical expectation, mean, average, or first moment) is a generalization of the weighted average. Informally, the expected value is the arithmetic mean of a l ...
of claws is at least 1.


Algorithms

If classical computers are used, the best algorithm is similar to a Meet-in-the-middle attack, first described by
Diffie Bailey Whitfield 'Whit' Diffie (born June 5, 1944), ForMemRS, is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper ''New Dire ...
and
Hellman Hellman is a surname. Notable people with the surname include: * Åke Hellman (1915–2017), Finnish centenarian, painter, and art professor * Bonnie Hellman (born 1950), American actress *C. Doris Hellman (1910–1973), American historian of scie ...
. The algorithm works as follows: assume , A, \leq , B, . For every x \in A, save the pair (f(x),x) in a
hash table In computing, a hash table, also known as hash map, is a data structure that implements an associative array or dictionary. It is an abstract data type that maps keys to values. A hash table uses a hash function to compute an ''index'', ...
indexed by f(x). Then, for every y \in B, look up the table at g(y). If such an index exists, we found a claw. This approach takes time O(, A, + , B, ) and memory O(, A, ). If
quantum computer Quantum computing is a type of computation whose operations can harness the phenomena of quantum mechanics, such as superposition, interference, and entanglement. Devices that perform quantum computations are known as quantum computers. Thoug ...
s are used, Seiichiro Tani showed that a claw can be found in complexity \sqrt /math> if , A, \le, B, <, A, ^2 and \sqrt if , B, \ge, A, ^2. Shengyu Zhang showed that asymptotically these algorithms are the most efficient possible.


Applications

As noted, most applications of the claw finding problem appear in
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
. Examples include: *
Collision In physics, a collision is any event in which two or more bodies exert forces on each other in a relatively short time. Although the most common use of the word ''collision'' refers to incidents in which two or more objects collide with great fo ...
finding on cryptographic
hash function A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called ''hash values'', ''hash codes'', ''digests'', or simply ''hashes''. The values are usually ...
s. * Meet-in-the-middle attacks: using this technique, ''k'' bits of round keys can be found in time roughly 2k/2+1. Here ''f'' is encrypting halfway through and ''g'' is decrypting halfway through. This is why
Triple DES In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data Encryption Stand ...
applies
DES Des is a masculine given name, mostly a short form (hypocorism) of Desmond (name), Desmond. People named Des include: People * Des Buckingham, English football manager * Des Corcoran, (1928–2004), Australian politician * Des Dillon (disambig ...
three times and not just two.


References

{{Reflist Computational complexity theory Quantum complexity theory Probabilistic complexity classes