Cryptographic Hash Functions
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are the two main categories of cryptography?

Secret key (symmetric) and public key (asymmetric)

What are the characteristics of hash functions?

Easy to compute, but almost impossible to reverse; map data of arbitrary size to data of fixed size; efficient computability; deterministic; and non-reversible.

What is the primary difference between cryptographic hash functions and regular hash functions?

Crytographic hash functions are deliberately made very difficult to reverse, while regular hash functions are not.

Why are cryptographic hash functions considered one-way functions?

<p>Because it is deliberately very difficult to determine the input if you know the hash value.</p> Signup and view all the answers

What is the significance of the illustration showing the drastic change in output for a small change in input?

<p>It demonstrates that similar input does not hash to similar values, which is a key property of cryptographic hash functions.</p> Signup and view all the answers

Is the modulus function cryptographically secure? Explain.

<p>No, the modulus function is not cryptographically secure because it is reversible and does not satisfy the properties of a cryptographic hash function.</p> Signup and view all the answers

What is the purpose of the m.update() function in the given Python code?

<p>To update the hash object with the given data.</p> Signup and view all the answers

What is the output of the given Python code?

<p>A SHA256 hash value represented as a hexadecimal string.</p> Signup and view all the answers

What is pre-image resistance in the context of cryptographic hash functions?

<p>The inability to find the original input data given its hash value.</p> Signup and view all the answers

What is the difference between second pre-image resistance and collision resistance?

<p>In second pre-image resistance, the attacker is given a fixed input, while in collision resistance, the attacker can choose any two inputs.</p> Signup and view all the answers

Why is collision resistance considered a stronger security property than pre-image resistance?

<p>Because it is harder to find any two inputs with the same hash value than to find an input with a given hash value.</p> Signup and view all the answers

What is the security implication of a hash function lacking collision resistance?

<p>It makes it possible for an attacker to find two different inputs with the same hash value.</p> Signup and view all the answers

What is the purpose of committing a message in the context of online auctions?

<p>To ensure that the sender cannot change the value or statement after committing to it, similar to a sealed envelop.</p> Signup and view all the answers

What is the security property of a commitment scheme that ensures it is infeasible to find a different message that produces the same commitment?

<p>Binding</p> Signup and view all the answers

What is the purpose of hashing in a blockchain?

<p>To ensure immutability and integrity of the ledger by making any changes to the blocks detectable.</p> Signup and view all the answers

What is the purpose of the nonce value in a block in a blockchain?

<p>To find a value that, when hashed, produces a hash value starting with a certain number of zeros.</p> Signup and view all the answers

What is the significance of maintaining only the head pointer to the last block in a blockchain?

<p>It allows for efficient detection of any changes to the ledger.</p> Signup and view all the answers

Why is brute force searching the only known approach to solve the mining puzzle?

<p>Because there is no known efficient algorithm to reverse-engineer the hash function.</p> Signup and view all the answers

What is the main purpose of a cryptographically secure hash function?

<p>To detect errors in file transfers and ensure integrity, authenticity, and hiding of data.</p> Signup and view all the answers

What is the main difference between SHA1 and SHA2?

<p>SHA1 has a 160-bit hash and is considered broken, while SHA2 is a family of hash functions with different sizes and is still considered secure.</p> Signup and view all the answers

What is the Merkle-Damgård construction?

<p>A general method of breaking input messages into equal-sized blocks and applying a compression function iteratively to produce a hash value.</p> Signup and view all the answers

What is the purpose of padding in a hash function?

<p>To ensure that the input message is a multiple of the block size.</p> Signup and view all the answers

What is a collision attack in the context of hash functions?

<p>A type of attack where an attacker finds two different input messages that produce the same output hash value.</p> Signup and view all the answers

What is the main advantage of SHA3 over SHA2?

<p>SHA3 has no known attacks and is considered secure, while SHA2 has minor attacks and is considered weak.</p> Signup and view all the answers

What is the primary goal of Message Authentication Code (MAC) in online auctions?

<p>To create a hash that can only be created or verified by someone with the key, offering both message authenticity and message integrity.</p> Signup and view all the answers

What is the problem with the MAC technique H(m | k)?

<p>The key only impacts the last stage of calculating the hash.</p> Signup and view all the answers

What is the purpose of HMAC (Hash-based MAC) in cryptographic applications?

<p>To build a MAC function that is provably secure using cryptographic hash functions.</p> Signup and view all the answers

What is the concept of commitment in cryptographic applications?

<p>To allow one to commit to a chosen value or statement while keeping it hidden from others, with the ability to reveal the committed value later.</p> Signup and view all the answers

What is the difference between H(k | m) and H(k | m1m2… mn+1)?

<p>H(k | m1m2… mn+1) is more secure because it prevents message extension attacks, whereas H(k | m) is vulnerable to such attacks.</p> Signup and view all the answers

What is the purpose of the keys K', K'', and K in the HMAC algorithm?

<p>Key K is used to generate K' and K'', and K', K'', and K are used to calculate the HMAC.</p> Signup and view all the answers

More Like This

Hash Functions and Cryptography Quiz
3 questions
SHA-3 Hash Function
29 questions
Hash Functions in Computer Science
24 questions

Hash Functions in Computer Science

PrincipledForeshadowing avatar
PrincipledForeshadowing
Use Quizgecko on...
Browser
Browser