TY - JOUR
T1 - Hash functions and information theoretic security
AU - Bagheri, Nasoor
AU - Knudsen, Lars Ramkilde
AU - Naderi, Majid
AU - Thomsen, Søren Steffen
PY - 2009
Y1 - 2009
N2 - Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic attack costs and real costs. We show that in the information theoretic model, many well-known and commonly used hash functions such as MD5 and SHA-256 fail to be preimage resistant.
AB - Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic attack costs and real costs. We show that in the information theoretic model, many well-known and commonly used hash functions such as MD5 and SHA-256 fail to be preimage resistant.
U2 - 10.1587/transfun.E92.A.3401
DO - 10.1587/transfun.E92.A.3401
M3 - Letter
SN - 0916-8508
VL - E92-A
SP - 3401
EP - 3403
JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IS - 12
ER -