A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
The Power of Evil Choices in Bloom Filters
2015
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
A Bloom filter is a probabilistic hash-based data structure extensively used in software including online security applications. This paper raises the following important question: Are Bloom filters correctly designed in a security context? The answer is no and the reasons are multiple: bad choices of parameters, lack of adversary models and misused hash functions. Indeed, developers truncate cryptographic digests without a second thought on the security implications. This work constructs
doi:10.1109/dsn.2015.21
dblp:conf/dsn/GerbetKL15
fatcat:suvydo7orndzpkmuzjrn6if5ky