P2L8 Hashes Flashcards

1
Q

Weak vs Strong Collision resistance

A

WEAK: When you can find m2 such that H(m2) = H(m1). It is weak only to a given input message. STRONG: Hash function is resistant to any pair of different messages. This implies the weaker property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

pigeonhole problem of hash functions

A

there are many more ‘pigeons’ than there are ‘pigeon holes’. Because the size of the hash is fixed size, but the input is not. So many inputs will match to the same output value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

determining hash length

A

In this snippet the top row is ‘l’ not 1. The bottom row means you need to find 232 possibilities before you reach a hash collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If length of a hash is 128 bits, then how many messages does an attacker need to search in order to find two that share the same hash?

A

64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In SHA 2, how many rounds are used to process a message block?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

why use hash based message authentication?

A
  • Hash functions are very efficient (execute faster)
  • library code widely available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HMAC is secure because…

A

A secret key is hashed with the message content. An attacker cannot compute the HMAC value for m2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash functions are used for message authentication but not…

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hash based message auth scenario

A
  1. Alice and bob share secret key.
  2. Alice authenticates herself by sending ‘Hello’ message and hashing the message along with shared secret key.
  3. Bob receives this hash value along with hello message in plaintext, bob can hash the hello message along with the shared key
  4. Bob sees whether that hash value matches the value he received. If they match, then Alice is authenticated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital signatures steps

A
  1. alice hashes m
  2. then signs hash value of m with private key
  3. then she sends message m in plaintext along with signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is recommended minimum length of a hash?

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly