Question: 11.1 What characteristics are needed in a secure hash function? 11.2 What is the difference between weak and strong collision resistance? 11.3 What is the
11.1 What characteristics are needed in a secure hash function? 11.2 What is the difference between weak and strong collision resistance? 11.3 What is the role of a compression function in a hash function? 11.4 What is the difference between little-endian and big-endian format? 11.5 What basic arithmetical and logical functions are used in SHA? 11.6 Describe the set of criteria used by NIST to evaluate SHA-3 candidates. 11.7 Define the term sponge construction. 11.8 Briefly describe the internal structure of the iteration function f. 11.9 List and briefly describe the step functions that comprise the iteration function f.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
