Hash Function Flashcards

1
Q

The properties which a hash function needs to process in order to be secure

A

Collusion resistance- impossible to find two distinct inputs that hash to the same value.
Preimage resistance - impossible to reverse the hash to find the original input.
Second preimage resistance - impossible to find a second, different input that has the same hash as a given input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Suppose that hash function H with output length n, what is the security level of H

A

N/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When was SHA-3 standardised by NIST

A

2015

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two techniques used to design hash functions

A

Customised hash functions/ merkle damgard construction

Block cipher based hash functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain why the security of hash functions is 2^n/2 and not 2^n where n is the length of the hash output

A

The probability of finding a match increases as more and more hashes are generated.
After approximately 2^n/2 random inputs there is a 50% chance of a collision occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two principle modes of SHA-3 Hash Function usage

A

Hashing mode (fixed length output)
Extendable output function (XOF) mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly