Crypto - 3. Hashing Flashcards
What is the primary function of a cryptographic hash function?
To produce a fixed-length digest from an input of any size for secure data representation.
Fill in the blank: A cryptographic hash function transforms an input message into a ______.
Fixed-length digest.
What are common applications of cryptographic hash functions?
Digital signatures, key derivation, bit commitment, and message authentication.
Why are digital signatures combined with hash functions?
Hashing a message before signing reduces data size and improves efficiency.
Define an Extendable Output Function (XOF).
An XOF is a hash function that can produce outputs of any desired length.
Fill in the blank: XOFs are often used in applications requiring ______ length outputs.
Variable.
What is preimage resistance in a hash function?
It means finding an input that maps to a given output should be computationally difficult.
Explain second preimage resistance in hash functions.
It should be hard to find a different input that produces the same hash as a given input.
What is collision resistance?
Collision resistance means it should be hard to find two distinct inputs with the same hash output.
How does the birthday paradox relate to collision resistance?
The paradox shows that collisions are more likely than expected; 23 people have a high chance of sharing a birthday.
What is MD5 and why is it considered insecure?
MD5 is an older 128-bit hash function with known vulnerabilities to collision attacks.
Fill in the blank: SHA-1 was standardized by ______ in 1995 but is now considered insecure.
NIST
Name a secure hash function family that replaced SHA-1.
SHA-2
Describe the SHA-3 standard and its basis.
SHA-3 is based on the KECCAK algorithm and includes SHA3-{224, 256, 384, 512} and SHAKE{128, 256} functions.
What is the Merkle-Damgård construction?
A method used in hash functions to process messages in blocks and chain intermediate hash values.