International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions

Authors:
G. Laccetti
G. Schmid
Download:
URL: http://eprint.iacr.org/2004/324
Search ePrint
Search Google
Abstract: In this paper we focus on the three basic security requirements for a cryptographic hash function, commonly referred as preimage, second preimage and collision resistance. We examine these security requirements in the case of attacks which do not take advantage on how the hash function is computed, expressing them as success probabilities of suitable randomized algorithms. We give exact mathematical expressions for such resistance indices, and obtain their functional behaviour in relation to the amount of uniformity in the hash function outcomes. Our work provides a mathematical framework for the study of cryptographic hash functions, which enable us to give proofs for some prevailing beliefs.
BibTeX
@misc{eprint-2004-12289,
  title={On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions},
  booktitle={IACR Eprint archive},
  keywords={foundations / Hash functions, Brute force attacks, Resistance},
  url={http://eprint.iacr.org/2004/324},
  note={ schmid@unina.it 12746 received 24 Nov 2004},
  author={G. Laccetti and G. Schmid},
  year=2004
}