Content deleted Content added
m Reverted 1 edit by 103.97.242.120 (talk) to last revision by Tule-hog |
UmbyUmbreon (talk | contribs) Reverted 1 edit by 178.73.75.172 (talk): Unexplained removal of references and links |
||
(10 intermediate revisions by 10 users not shown) | |||
Line 31:
In practice, collision resistance is insufficient for many practical uses. In addition to collision resistance, it should be impossible for an adversary to find two messages with substantially similar digests; or to infer any useful information about the data, given only its digest. In particular, a hash function should behave as much as possible like a [[random function]] (often called a [[random oracle]] in proofs of security) while still being deterministic and efficiently computable. This rules out functions like the [[SWIFFT]] function, which can be rigorously proven to be collision-resistant assuming that certain problems on ideal lattices are computationally difficult, but, as a linear function, does not satisfy these additional properties.{{sfn|Lyubashevsky|Micciancio|Peikert|Rosen|2008| pp=54–72}}
Checksum algorithms, such as [[
=== Degree of difficulty ===
|