Cryptographic Hash Functions Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the maximum estimated time for Eve to launch a collision attack using a hash function with a 64-bit digest?

  • Less than an hour
  • 500 years
  • 1 hour (correct)
  • 10 thousand years
  • How many tests are needed to successfully perform a collision attack on MD5?

  • 230 tests
  • 280 tests
  • 264 tests (correct)
  • 2128 tests
  • What is the digest size of the SHA-1 hash function?

  • 256 bits
  • 160 bits (correct)
  • 512 bits
  • 128 bits
  • Which hash function is described to be resistant to collision attacks based on the Random Oracle Model?

    <p>SHA-512</p> Signup and view all the answers

    What is the relationship between a message digest and a message authentication code (MAC)?

    <p>A MAC ensures the authenticity of the message sender</p> Signup and view all the answers

    Which statement accurately describes the essential difference between a document and its fingerprint compared to a message and its message digest?

    <p>The document and fingerprint are linked while the message and digest can exist separately.</p> Signup and view all the answers

    How long would it theoretically take to launch a collision attack on SHA-1 if tests can be performed at 230 per second?

    <p>About 10 thousand years</p> Signup and view all the answers

    What are the three criteria that a cryptographic hash function must satisfy?

    <p>Preimage resistance, Second preimage resistance, Collision resistance</p> Signup and view all the answers

    What is the purpose of a modification detection code (MDC)?

    <p>To ensure the integrity of the message</p> Signup and view all the answers

    How many tests does SHA-512 require to find a collision with a probability of 1/2?

    <p>2^256 tests</p> Signup and view all the answers

    Why can a conventional lossless compression method like StuffIt not be used as a cryptographic hash function?

    <p>It creates reversible messages, compromising its security.</p> Signup and view all the answers

    What does second preimage resistance in a cryptographic hash function prevent?

    <p>Finding a message that has a specific hash output.</p> Signup and view all the answers

    Which of the following statements about collision resistance is true?

    <p>It ensures that no two messages can ever produce the same hash output.</p> Signup and view all the answers

    In the Random Oracle Model, what is the primary function of the oracle?

    <p>To simulate the behavior of a true cryptographic hash function.</p> Signup and view all the answers

    What is a significant limitation of using a checksum function as a cryptographic hash function?

    <p>It lacks preimage resistance, leading to multiple valid inputs for a single checksum.</p> Signup and view all the answers

    What aspect of document integrity can a fingerprint verify?

    <p>That the document has not been altered.</p> Signup and view all the answers

    What is the primary output size of the SHA algorithm?

    <p>160-bit hash values</p> Signup and view all the answers

    Which SHA version added in FIPS 180-2 does NOT exist?

    <p>SHA-128</p> Signup and view all the answers

    What role do the 80 constants, K0 to K79, serve in the SHA-512 algorithm?

    <p>They provide round constants in the compression function.</p> Signup and view all the answers

    What key feature is employed by the SHA-512 compression function?

    <p>Processing in 1024-bit blocks</p> Signup and view all the answers

    If the first hexadecimal digits of buffers A, B, and C are 0x7, 0xA, and 0xE respectively, what is the leftmost hexadecimal digit of the resulting Majority function?

    <p>0xE</p> Signup and view all the answers

    What aspect of SHA-1 has raised concerns about its future applications?

    <p>Security vulnerabilities indicated in 2005</p> Signup and view all the answers

    Which function in SHA-512 is responsible for providing output based on the majority of input bits?

    <p>Majority function</p> Signup and view all the answers

    Which of the following SHA versions was introduced as a part of the revised Secure Hash Standard?

    <p>SHA-512</p> Signup and view all the answers

    Which property of a cryptographic hash function ensures that it is computationally infeasible to find two different inputs that produce the same hash output?

    <p>Collision-free property</p> Signup and view all the answers

    What is the primary purpose of a Message Authentication Code (MAC)?

    <p>To authenticate a message using a keyed hash</p> Signup and view all the answers

    How can HMAC security be compromised?

    <p>By finding a collision in the underlying hash algorithm</p> Signup and view all the answers

    Which of the following is a characteristic of a cryptographic hash function that allows it to detect changes in a message?

    <p>It produces a fixed-size output regardless of input size</p> Signup and view all the answers

    Which method is employed to achieve non-repudiation in digital signatures?

    <p>Encrypting the hash with a private signing key</p> Signup and view all the answers

    What is the significance of using a pseudorandom function (PRF) in cryptography?

    <p>To derive keys cooperatively from a master key</p> Signup and view all the answers

    In the context of digital signatures, what role does the public key play?

    <p>It verifies the signature created with the private key</p> Signup and view all the answers

    What is the primary purpose of creating a message digest (MDC) when sending a message?

    <p>To verify the integrity of the message.</p> Signup and view all the answers

    Which of the following elements are crucial for message authentication?

    <p>Integrity, confidentiality, non-repudiation.</p> Signup and view all the answers

    Which hashing technique ensures that the original password cannot be easily retrieved from stored data?

    <p>One-way hashes</p> Signup and view all the answers

    Why does the security of a Message Authentication Code (MAC) depend on the underlying hash algorithm?

    <p>Because a weaker hash algorithm can compromise the MAC's ability to detect alterations.</p> Signup and view all the answers

    What is a significant disadvantage of using public-key encryption for message authentication?

    <p>It provides no confidence of the sender's identity.</p> Signup and view all the answers

    In the context of symmetric message encryption, which statement is true?

    <p>The message is secure if both parties share the same key.</p> Signup and view all the answers

    What occurs when signing a message using the sender's private key followed by encrypting with the recipient's public key?

    <p>It offers both secrecy and authentication.</p> Signup and view all the answers

    What is a potential issue related to the use of PKCS in public-key encryption?

    <p>It causes the size of the encrypted message to increase.</p> Signup and view all the answers

    Which factor contributes to the requirement of recognizing corrupted messages in public-key encryption?

    <p>Public keys are publicly available.</p> Signup and view all the answers

    What is the primary violation that occurs when an oracle uses a formula h(M) = M mod n to create message digests?

    <p>It generates predictable digests.</p> Signup and view all the answers

    According to the pigeonhole principle, if a hash function produces 4-bit digests and accepts 6-bit messages, how many different messages can correspond to a single digest?

    <p>64</p> Signup and view all the answers

    How many digests should Eve create to have more than a 50% probability of finding an original message with a 64-bit digest?

    <p>Approximately 0.69 × 2^64</p> Signup and view all the answers

    If Eve can generate 2^30 messages per second, how long would it take her to find a preimage for a 64-bit digest?

    <p>Approximately 500 years</p> Signup and view all the answers

    In the case of a collision attack with a 64-bit digest, how many digests would Eve need to create to exceed a probability of 50% in finding two messages with the same digest?

    <p>Approximately 1.18 × 2^33</p> Signup and view all the answers

    What characteristic of a cryptographic hash function is directly challenged by a collision attack on a 64-bit digest?

    <p>The ability to generate unique digests.</p> Signup and view all the answers

    What does the 'k' represent in the generalized version of the pigeonhole principle related to message digests?

    <p>The maximum number of collisions possible.</p> Signup and view all the answers

    When evaluating the security of a digest size of 64 bits against different types of attacks, which attack is the digest least secure against?

    <p>Collision attack</p> Signup and view all the answers

    Study Notes

    Cryptography and Network Security Week 9-11

    • This week covers message integrity, cryptographic hash functions, cryptographic hash function criteria, preimage resistance, second preimage resistance, collision resistance, random oracle model, and message authentication.

    Message Integrity

    • Cryptography systems typically provide secrecy/confidentiality but not integrity.
    • Integrity ensures the message hasn't been altered.
    • Preserving document integrity: Using a fingerprint (analogous to a digital fingerprint/message digest). Alice places her fingerprint at the bottom of a document.
    • Electronic equivalent of document/fingerprint pair: message/digest pair.
    • A hash function converts a message into a fixed-size digest.

    Cryptographic Hash Function Criteria

    • Preimage resistance: Given a hash, it is computationally infeasible to find the original message producing that hash.
    • Second preimage resistance: Given a message and its hash, it is computationally infeasible to find a different message with the same hash.
    • Collision resistance: It is computationally infeasible to find two different messages with the same hash.

    Random Oracle Model

    • Introduced in 1993 by Bellare and Rogaway.
    • Serves as an ideal mathematical model for hash functions.
    • Assumes the hash function is a random oracle. This means that the hash function acts like a random function—it maps inputs to outputs in a completely unpredictable way.

    Message Authentication

    • A message digest by itself does not authenticate the sender.
    • Modification detection code (MDC): Digest created by cryptographic hash function.
    • Message authentication code (MAC): Needed for authenticating the sender.
    • A MAC uses a secret key known only to the sender and receiver.

    Attack Types and Algorithms

    • Preimage Attack: Given a digest, find the original message
    • Second Preimage Attack: Given a message, find another message with the same digest.
    • Collision Attack: Find two different messages with the same digest.
    • The difficulty of the attacks increase proportionally to 2n (preimage), 2n (second preimage), and 2n/2 (collision), where n is the number of bits in the digest/hash value.
      • Example 11.2: A checksum function is not a cryptographic hash function.

    Additional Points

    • Cryptographic hash functions are important for message integrity and authentication when data needs to persist longer than its encryption.
    • A 64-bit digest offers security against preimage attacks but not collision attacks; a 128-bit digest is preferred for better security.
    • SHA-1 and MD5 were popular hash functions, but are now considered vulnerable to attack due to improvements in computer processing and discovery of weaknesses in the algorithms.
    • SHA-2 (e.g. SHA-512) was introduced as a replacement for previous versions to increase security, but still relies on iteration and can be attacked by a cryptanalytic attacks.
    • Whirlpool: An iterated hash function that uses a symmetric-key block cipher in place of the compression function; the block cipher is a modified AES cipher.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on cryptographic hash functions with this quiz. Explore questions about collision attacks, digest sizes, and essential differences between message digests and MACs. Discover the requirements for secure hash functions and their use in data integrity.

    More Like This

    Hashing
    72 questions

    Hashing

    CourtlyErudition avatar
    CourtlyErudition
    Cryptographic Hash Functions and Keyed Hashing Quiz
    5 questions
    Cryptographic Hash Functions Quiz
    16 questions
    Properties of Cryptographic Hash Functions
    10 questions
    Use Quizgecko on...
    Browser
    Browser