Question: 4. As described in $2.4.4 Efficient Digital Stignatures, it is common, for performance reasons, to sign a hash of a message rather than the message

4. As described in \$2.4.4 Efficient Digital Stignatures, it is common, for performance reasons, to sign a hash of a message rather than the message itself. Why is it so important that it be difficult to find two messages with the same hash? [20 points] 5. Assume a cryptographic algorithm in which the performance for the good guys (the ones that know the key) grows linearly with the length of the key, and for which the only way to break it is a bruteforce attack of tyjing all possible keys. Suppose the performance at a certain key-size is adequate for the good guys (es, encryption and decryption can be done as fast as the bits can be transmitted over the wire). Then suppose advances in computer technology make computers twice as fast. Given that both the good guys and the bad guys get faster computers, does this advance in computer speed work to the advantage of the good guys, the bad guys, or does it not make any difference? [20 points]
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
