Cryptographic data integrity algorithms Flashcards
what are Hash functions?
Functions that accepts a variable length block of data and produces a fixed size hash value
Are hash values public or private?
public
What do hash functions detect?
changes to message
Give to cryptographic hash function properties and define each.
1- One-Way property : computationally infeasible to find data mapping to a specific hash value
2- Collision-free property : computationally infeasible to find two data to same hash
What are the applications of Cryptographic hash functions?
- Message authentication
- digital signatures
- one way password file
- intrusion detection and virus detection
- PRF, PRNG
What is message authentication>
verify the integrity of the message
What is digital signature?
the hash value of a message is encrypted using the user’s private key
What is one way password file?
keeping the hash value of the password not the actual password
what is intrusion and virus detection
Keep and check hash files on the system
h=H(x), we say that x is a ….. of h, and x is a data block whose hash function is —. the function is —
preimage,h,H
Collision is:
a. one to one hash mapping
b. one to many hash mapping
c. many to one hash mapping
d. many to many hash mapping
c
State the hash function requirements.
- variable input size
- fixed output size
- efficiency: H(x) is easy to compute for any given ‘x’ making SW and HW implementations practical.
- preimage resistant(one way property): for given ‘h’ it is infeasible to find y in H(y) = h
- second preimage resistant(weak collision resistant) : for given block x, it is infeasible to find y!x in H(x) = H(y)
- Collision resistant(strong): it is infeasible to find a pair(x,y) such that H(y) = H(x)
pseudo-randomness : Output of H meets standard tests for pseudo-randomness
State attacks on Hash Functions
- Brute force
- cryptanalysis
- preimage and secon preimage: find y in H(y) such that H(y) = h
- collision resistance : determine two values with the same hash value(x and y) such the H(x)=H(y)
what determines the length of the hash code against brute force?
2^m/2
True or False:
128 bits is inadequate , 160 bits suspect
True
MD4 produces a ….. bit hash value
160
SHA-1 is considered :
a. secure
b. not secure
b
versions of SHA (also known as SHA-2) are:
SHA-256
SHA-384
SHA-512
What are message security requirements?
-Disclosure
-Source repudiation
-destination repudiation
-Traffic analysis
-Masquerade
-content modification
- sequence modification
-timing modification
what is the type that is based on a hash function
keyed hash functions as MAC