Quiz 1 Flashcards
What makes a cryptographically secure hash function?
- Collision resistance
- Hiding/Pre-Image resistance
- Puzzle friendliness (hard to find x given y)
Hash Pointers
Pointer to where some data is stored, cryptographic hash of info.
Hash Function
Mathematical functions that satisfy the following three properties:
• Inputs can be any size (not-fixed);
• Outputs are fixed-size (we’ll generally employ a hash function such as SHA-256 that has an output size of 256 bits)
• Efficiently computable, i.e., the mapping should be efficiently (in polynomial time in terms of the input size) computable
Blockchain
Linked list of hash pointers, each block contains header of previous block
Merkle Tree
Binary tree of hash pointers
Digital Signature
Private key to encrypt/sign, public key to decrypt
Symmetric encryption
Single key encryption
Asymmetric/Public key encryption
Public key used to encrypt, private key used to decrypt