Question: Asymmetric encryption principles, digital signatures, one way hashing, message authentication codes, key derivation 1 ) Say Bob wants to use his RSA digital signature to

Asymmetric encryption principles, digital signatures, one way hashing, message authentication codes, key derivation
1) Say Bob wants to use his RSA digital signature to sign a 1GB file. Why is it better to sign a hash rather than signing the entire file?
2) What is a message digest?
3) Suppose you use a hash function to generate a 256 bit hash of a 1GB file. Using your intuition how can you be certain that an adversary given only the hash value can not reverse the hash function to recover the 1GB file?
4) Using the example from problem 3, again using your intuition explain whether you believe it is possible that any 256 bit hash function might given the same hash output for different input messages?
5) Password systems typically store a hash value of your password along with a random salt value that is added to your password when hashing. Why is the salt value needed?
6) Assume you have a hash function where it simply removes vowels from a word. So for example hash(hello) hll.
1. Give an example of a 1st pre-image attack for h =hm(give at least 2 words that could hash to hm)
2. Give 2 examples of a 2nd pre-image attack for the word fluid.
3. Give 2 examples of a collision attack (2 sets of words that hash to the same value).

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!