Question: 1. Answer the discussion board questions below regarding cryptographic hash functions: a. What is the birthday paradox? Have you ever been in a group of
1. Answer the discussion board questions below regarding cryptographic hash functions:
a. What is the birthday paradox? Have you ever been in a group of people where someone had the same birthday as yours? What is the probability that this could ever happen?
b. How can the birthday paradox be used to determine the strength of any of the secure hash algorithms (SHA) in terms of the length of the hash (m)?
c. Look up SHA-3 on Wikipedia or other website. Is there any other name used for SHA-3 besides SHA-3? Does SHA-3 use a Merkle-Damgaard construction? If not, what type of computation is SHA-3 based on?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
