We provide attacks and analysis that capture a tradeoff, in the ideal-permutation model, between the speed of a permutation-based hash function and its potential security. We show that any 2n-bit to n-bit compression function will have unacceptable collision resistance it makes fewer than three n-bit permutation invocations, and any 3n-bit to 2n-bit compression function will have unacceptable security if it makes fewer than five n-bit permutation invocations. Any rate-α hash function built from n-bit permutations can be broken, in the sense of finding preimages as well as collisions, in about N 1∈-∈α queries, where N∈=∈2 n . Our results provide guidance when trying to design or analyze a permutation-based hash function about the limits of what can possibly be done. © 2008 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Rogaway, P., & Steinberger, J. (2008). Security/efficiency tradeoffs for permutation-based hashing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4965 LNCS, pp. 220–236). https://doi.org/10.1007/978-3-540-78967-3_13
Mendeley helps you to discover research relevant for your work.