Question: Asymmetric encryption principles, digital signatures, one way hashing, message authentication codes, key derivation 1 ) Say Bob wants to use his RSA digital signature to
Asymmetric encryption principles, digital signatures, one way hashing, message authentication codes, key derivation
Say Bob wants to use his RSA digital signature to sign a GB file. Why is it better to sign a hash rather than signing the entire file?
What is a message digest?
Suppose you use a hash function to generate a bit hash of a GB file. Using your intuition how can you be certain that an adversary given only the hash value can not reverse the hash function to recover the GB file?
Using the example from problem again using your intuition explain whether you believe it is possible that any bit hash function might given the same hash output for different input messages?
Password systems typically store a hash value of your password along with a random salt value that is added to your password when hashing. Why is the salt value needed?
Assume you have a hash function where it simply removes vowels from a word. So for example hashhello hll
Give an example of a st preimage attack for h hmgive at least words that could hash to hm
Give examples of a nd preimage attack for the word fluid
Give examples of a collision attack sets of words that hash to the same value
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
