Skip to main content
  • 2445 Accesses

Synonyms

One-way property

Related Concepts

Collision Resistance; Hash Functions; One-Way Function; Second Preimage Resistance

Definition

Preimage resistance is the property of a hash function that it is hard to invert, that is, given an element in the range of a hash function, it should be computationally infeasible to find an input that maps to that element.

Background

The concept of one-way functions in cryptography is attributed to Jevons (1874). Needham suggested in 1966 to use one-way functions in order to protect password files in computer systems. The use of one-way hash functions in cryptography was proposed in 1976 by Diffie and Hellman [ 2].

Theory

Preimage resistance corresponds to one-wayness, which is typically used for functions with input and output domain of similar size (One-Way Function). A minimal requirement for a hash function to be preimage resistant is that the length of its result should be at least 90 bits (in 2011). Preimage resistance needs to be...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 748.99
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 896.74
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Damgård IB (1990) A design principle for hash functions. In: Brassard G (ed) Advances in cryptology, Proceedings Crypto’89, Santa Barbara. LNCS, vol 435. Springer, New York, pp 416–427

    Google Scholar 

  2. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE T Info Theory IT–22(6):644–654

    Google Scholar 

  3. Gibson JK (1990) Some comments on Damgård’s hashing principle. Electron Lett 26(15):1178–1179

    MathSciNet  Google Scholar 

  4. Merkle R (1979) Secrecy, authentication, and public key systems. UMI Research Press, Ann Arbor

    Google Scholar 

  5. Preneel B (1993) Analysis and design of crypto-graphic hash functions. Doctoral Dissertation, Katholieke Universiteit Leuven

    Google Scholar 

  6. Preneel B (1999) The state of cryptographic hash functions. In: Damgård I (ed) Lectures on data security. LNCS, vol 1561. Springer, Berlin, pp 158–182

    Google Scholar 

  7. Rabin MO (1978) Digitalized signatures. In: Lipton R, DeMillo R (eds) Foundations of secure computation. Academic, New York, pp 155–166

    Google Scholar 

  8. Rogaway P, Shrimpton T (2004) Cryptographic hash function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy BK, Meier W (eds) Fast software encryption. LNCS, vol 3017. Springer, Berlin, pp 371–388

    Google Scholar 

  9. Stinson DR (2006) Some observations on the theory of cryptographic hash functions. Design Code Cryptogr 38(2):259–277

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Preneel, B. (2011). Preimage Resistance. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_604

Download citation

Publish with us

Policies and ethics