Content deleted Content added
Typo fixing using AWB |
→Types of security of hash functions: Added Oxford Comma for clarity, and expanded <math> brackets to clearly define the difference between the math and sentence |
||
Line 5:
==Types of security of hash functions==
Generally, the ''basic'' security of [[cryptographic hash functions]] can be seen from three different angles: pre-image resistance, second pre-image resistance, and collision resistance.
* '''Pre-image resistance''': given a hash <math>h</math> it should be ''hard'' to find any message <math>m</math> such that <math>h = hash(m)</math>. This concept is related to that of
* '''Second pre-image resistance''': given an input <math>m_1</math>, it should be ''hard'' to find another input, <math>m_2</math> (not equal to <math>m_1</math>) such that
* '''Collision resistance''': it should be ''hard'' to find two different messages <math>m_1</math> and <math>m_2</math> such that
===The meaning of "hard"===
|