Skip to main content

Informally, a one-way function is a function for which computation in one direction is straightforward, while computation in the reverse direction is far more difficult. This is typically described in a more formal, though still not rigorous, way [3, 4, 5] as a function f with domain X and range (codomain) Y where f(x) is ‘easy’ to compute for all xX; but for ‘virtually all’ elements yY, it is ‘computationally infeasible’ to find an x such that f(x) = y. The function f is a one-way permutation when f is a bijective one-way function and X=Y (see also substitutions and permutations).

The seminal paper of Diffie and Hellman [1] was the first to set down the potential of one-way functions in the development of public-key cryptography. The interesting, and important, feature of the one-way function is the asymmetry in computational effort required to perform a function evaluation and its reverse. Diffie and Hellman provided a familiar example of such asymmetry in the difficulty of...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Diffie, W. and M.E. Hellman (1976). “New directions in cryptography.” IEEE Transactions on Information Theory, 22, 644–654.

    Article  MATH  MathSciNet  Google Scholar 

  2. Garey, M.R. and D.S. Johnson (1979). Computers and Intractability: A Guide to the Theory of NP-Completeness. W. Freeman, San Francisco.

    Google Scholar 

  3. Goldreich, O. (1999). Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Springer-Verlag, Berlin.

    Google Scholar 

  4. Massey, J.L. (1992). “Contemporary cryptology: An introduction.” Contemporary Cryptology, The Science of Information Integrity. ed. G.J. Simmons. IEEE Press.

    Google Scholar 

  5. Menezes, A.J., P.C. van Oorschot, and S.A. Vanstone (1997). Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.

    MATH  Google Scholar 

  6. Needham, R.M. and M.D. Schroeder (1978). “Using encryption for authentication in large networks of computers.” Communications of the ACM, 21, 993–999.

    Article  MATH  Google Scholar 

  7. Pohlig, S.C. and M.E. Hellman (1978). “An improved algorithm for computing logarithms over GF(p) and its cryptographic significance.” IEEE Transactions on Information Theory, 24, 106–110.

    Article  MATH  MathSciNet  Google Scholar 

  8. Yao, A.C. (1982). “Theory and applications of trapdoor functions.” Proceedings of the IEEE 23rd Annual Symposium on Foundations of Computer Science, 80–91.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Robshaw, M. (2005). One-Way Function. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_287

Download citation

Publish with us

Policies and ethics