This work presents an information-theoretic examination of diffusion-based purification methods, the state-of-the-art adversarial defenses that utilize Diffusion Models to remove malicious perturbations in adversarial examples. By theoretically characterizing the inherent purification