Security/efficiency tradeoffs for permutation-based hashing

55Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We provide attacks and analysis that capture a tradeoff, in the ideal-permutation model, between the speed of a permutation-based hash function and its potential security. We show that any 2n-bit to n-bit compression function will have unacceptable collision resistance it makes fewer than three n-bit permutation invocations, and any 3n-bit to 2n-bit compression function will have unacceptable security if it makes fewer than five n-bit permutation invocations. Any rate-α hash function built from n-bit permutations can be broken, in the sense of finding preimages as well as collisions, in about N 1∈-∈α queries, where N∈=∈2 n . Our results provide guidance when trying to design or analyze a permutation-based hash function about the limits of what can possibly be done. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Rogaway, P., & Steinberger, J. (2008). Security/efficiency tradeoffs for permutation-based hashing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4965 LNCS, pp. 220–236). https://doi.org/10.1007/978-3-540-78967-3_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free