Hashing Flashcards

1
Q

Easy to compute H(m)

A

Performance of hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Given H(m), but not m, it’s computationally infeasible to find m

A

One-way property of hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Given H(m), it’s computationally infeasible to find m’ such that H(m’) = H(m)

A

Pre-image resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computationally infeasible to find any pair m1, m2 such that H(m1) = H(m2)

A

Collision resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Too long of a hash

A

Unnecessary overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Too short of a hash

A

Birthday paradox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broken, collisions published in August 2004

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Too weak for serious applications

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Weaknesses were found, but still in use

A

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Collisions in 2^69 hash operations

A

SHA-1 birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

128-bit input digest of four 32-bit words

A

MD5 input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

512-bit message block (sixteen 32-bit words)

A

MD5 input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

128-bit output (four 32-bit words)

A

MD5 output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Each pass uses a table of constants to update output digest

A

MD5 operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Developed by NIST, specified in 1993

A

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Input processed in 512 bit blocks, with same padding as MD5

A

SHA1

17
Q

Input message must be < 2^64

A

SHA1

18
Q

Message digest output is 160 bits, five 32-bit words

A

SHA1 output

19
Q

Consists of 80 steps

A

Block processing in SHA

20
Q

Output of last step is added to input of first step

A

Block processing in SHA

21
Q

Slower to compute than MD5

A

Speed of SHA1

22
Q

Only works if set of valid messages is limited by some structure

A

Authentication via encryption

23
Q

Unsuitable for message authentication

A

CRC

24
Q

Used to detected random errors, not malicious attacks

A

CRC

25
Q

Attacker can easily modify message and recompute CRC

A

CRC can only be used to detect random, not malicious errors

26
Q

Attack where additional information is appended onto hash

A

Length extension attack

27
Q

Build MAC out of a hash function

A

Hash MAC (HMAC)

28
Q

S(K,m) = H(k xor opad, H(k xor ipad || m))

A

HMAC

29
Q

opad and ipad are ____ ciphers

A

stream

30
Q

pad messages with 0x36 and 0x5c

A

HMAC processing

31
Q
A