Double Hashing can surely provides more security than only 1 layer of hashing, but does that necessarily mean it is more collision resistant? This question in a more math form: If H is a collision resistant hash function, is H(H(x)) for some x still collision resistant?
Is double hashing collision resistant?
1.6k Views Asked by AverageJoe At
2
There are 2 best solutions below
0
yadab
On
In principle, the resulted hash function H(H(x)) is either less or equally collision resistant because
- For the hash function H(x), for in each N unique pre-image lets assume there is one collision. which means there are two hashes being similar and H(H(x)) will not make it different.
- For the hash function H(x), for in each N unique pre-image lets assume there is one collision. this will be true for H(H(x)) as well because H(H(x)) is nothing but H(fixed length strings). This makes there is more chances of collision.
Related Questions in HASH
- Trouble validating md5 hashed password with randomly generated salt?
- Why k and l for LSH used for approximate nearest neighbours?
- PHP password_hash() / bcrypt
- Unique hash/index for time interval
- Order-independent Hash Algorithm
- git hard reset - what am I doing wrong?
- Java HashMap, hashCode() equals() - how to be consistent with multiple keys?
- Create hash from variables in loop
- Hashing integer coordinates of different sizes
- Xcode salting and hashing a password
- Is there a way to generate a Guid from a list of Guids?
- Path reconstruction with Hashing?
- Creating a Hash with keys from an array and empty arrays as the values
- How to read data from a different file without using YAML or JSON
- change value in hash using an array of keys in ruby
Related Questions in CRYPTOGRAPHY
- Do I have to randomize key in OpenSSL
- An exception of type 'System.Security.Cryptography.CryptographicException': keyset does not exist
- crypto.BadPaddingException: data hash wrong (EKYC-Response)
- Decrypted string returns "Length of the data to decrypt is invalid"
- Generate signature using private key with OpenSSL API
- Recovering an ECPublicKey from Java to JavaCard
- Proxy tool for CoAP integrated with DTLS
- Using CmsEnvelopedData with CmsSignedData to verify signed data
- Unchecked returned value causing unexpected states and conditions
- SQL-Server Verify SHA2_512 hash procedure
- SagePay Protocol 3.00 Encryption Error with ASP.NET
- Encrypting with PHP; decrypting with CryptoJS
- How can I write a function to recreate the original text obscured here by css magic?
- What encoding does [BouncyCastle] PKCS10CertificationRequest.getEncoded() return?
- Is integer comparison in Python constant time?
Related Questions in COLLISION
- How to check collision if only bottom half of the sprite matters (think of a cherry with a stem)
- unity 2D 5.0: collision with colliders, one with "is trigger" checked and one with "is trigger" unchecked
- How to check for collisions in ThreeJS?
- Java Game Development- Sprites colliding?
- didBeginContact logic OSX swift
- Removing items from ArrayList upon collision (Java)?
- Unity3D Play sound from particle
- Sticky Collisions
- Side Collisions
- Always a Collision
- How can I detect a specific 3d model collision three.js
- Collision detection between rectangles (no overlap) - libgdx
- Libgdx - collisions between two moving circles
- Collision between a line and a face
- c# XNA collesion slows movement
Related Questions in HASH-FUNCTION
- How to spike hash function collision rate?
- Quickest way of storing and accessing Strings in an array
- finding a hash function for long integer array
- A hash function to handle generic keys
- Hash function for Unordered associative containers in C++
- matlab unique identifier based on number
- good hash function
- Relationship between (1) hash function, (2) length of signature and (3) jaccard similarity?
- Is double hashing collision resistant?
- why a good choice of mod is "a prime not too close to an exact of 2"
- Tabulation hashing and N3980
- Does a linear cryptographic hash function exist?
- Are there no specializations of std::hash for standard containers?
- How to generate hash of arbitrary length with MurmurHash3 32 bit
- How to correctly implement hash insert function in c++?
Related Questions in HASH-COLLISION
- CRC32 Collision Probability
- How do I implement an erase function for a hash table?
- One way functions, Hash algorithms
- How to identify whether or not std::unordered_map has experienced hash collisions?
- How to discover identical files without comparing them to eachother?
- C++: proper use of HASH and Collision Techniques
- How to handle hash collisions?
- Is using unique data better than random data for a hash?
- CRC16 collision (2 CRC values of blocks of different size)
- Hashing and using a doubly-linked list to solve collisions
- Why does assinging a value to the key `True` of an dictionary overwrite the value of the key `1` in the same dictionary?
- What is the clash rate for md5?
- What hash function is better?
- MD5 hashing collision in username hashing
- Java hash collision probability
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
In fact it may even be worse for collision resistance because the output of the inner H is limited.
For example take function H which maps from {0,1}n → {0,1}n. (We restrict x to {0,1}n to make it easier to see.) Let's say the there are a, b from {0,1}n and c = H(a) = H(b). Which means H(c) = H(H(a)) = H(H(b)). When you have a collision in the first transformation, you can't unmake it.
If you don't have a collision in {0,1}n then the second transformation perform the same way.
Since we usually talk about hash functions as {0,1}* → {0,1}n there are bound to be collisions in the first transformation and the second transformation may make it even worse.