Hash Function Flashcards
The properties which a hash function needs to process in order to be secure
Collusion resistance- impossible to find two distinct inputs that hash to the same value.
Preimage resistance - impossible to reverse the hash to find the original input.
Second preimage resistance - impossible to find a second, different input that has the same hash as a given input.
Suppose that hash function H with output length n, what is the security level of H
N/2
When was SHA-3 standardised by NIST
2015
Two techniques used to design hash functions
Customised hash functions/ merkle damgard construction
Block cipher based hash functions
Explain why the security of hash functions is 2^n/2 and not 2^n where n is the length of the hash output
The probability of finding a match increases as more and more hashes are generated.
After approximately 2^n/2 random inputs there is a 50% chance of a collision occurring
Two principle modes of SHA-3 Hash Function usage
Hashing mode (fixed length output)
Extendable output function (XOF) mode