Professional Documents
Culture Documents
Palash Sarkar
L
[
H: {0, 1}i {0, 1}n .
i=0
L
[
H: {0, 1}i {0, 1}n .
i=0
L
[
H: {0, 1}i {0, 1}n .
i=0
L
[
H: {0, 1}i {0, 1}n .
i=0
If one can find second pre-images, then one can find collisions.
Suppose A is an algorithm to find second pre-images.
Take an arbitrary x1 ; use A on x1 to find a second pre-image x2 ;
return x1 and x2 .
If one can find second pre-images, then one can find collisions.
Suppose A is an algorithm to find second pre-images.
Take an arbitrary x1 ; use A on x1 to find a second pre-image x2 ;
return x1 and x2 .
No clear deterministic relation between finding pre-images and
finding collisions.
If one can find second pre-images, then one can find collisions.
Suppose A is an algorithm to find second pre-images.
Take an arbitrary x1 ; use A on x1 to find a second pre-image x2 ;
return x1 and x2 .
No clear deterministic relation between finding pre-images and
finding collisions.
There is, however, a probabilistic relation.
Suppose B is an algorithm to find pre-images.
Take an arbitrary x1 ; compute y = H(x1 ); use B on y to find a
pre-image x2 ; return x1 and x2 .
Under some relatively mild assumptions, x2 is different from x1 with
significant probability.
If one can find second pre-images, then one can find collisions.
Suppose A is an algorithm to find second pre-images.
Take an arbitrary x1 ; use A on x1 to find a second pre-image x2 ;
return x1 and x2 .
No clear deterministic relation between finding pre-images and
finding collisions.
There is, however, a probabilistic relation.
Suppose B is an algorithm to find pre-images.
Take an arbitrary x1 ; compute y = H(x1 ); use B on y to find a
pre-image x2 ; return x1 and x2 .
Under some relatively mild assumptions, x2 is different from x1 with
significant probability.
We provide some motivation for these properties.
sign H(M).
sign H(M).
Such functions are usually slow and not suitable for heavy duty
industrial applications.
Pr[Distinct(y1 , . . . , yq )] = Pr[yq
/ {y1 , . . . , yq1 }|Distinct(y1 , . . . , yq1 )]
Pr[Distinct(y1 , . . . , yq1 )]
q1
= 1 Pr[Distinct(y1 , . . . , yq1 )]
2n
1 q1
= 1 n 1 .
2 2n
Pr[Distinct(y1 , . . . , yq )] = Pr[yq
/ {y1 , . . . , yq1 }|Distinct(y1 , . . . , yq1 )]
Pr[Distinct(y1 , . . . , yq1 )]
q1
= 1 Pr[Distinct(y1 , . . . , yq1 )]
2n
1 q1
= 1 n 1 .
2 2n
Ramanna and Sarkar (2011) refined this approach and introduced the
notion of r -balance to quantify the resistance of concrete hash function
to generic multi-collision attacks.