Question: Information Security Problem Hashes can be used in online-bid systems. That is, instead of submitting the actual bits, each customer submits the hash of the

Information Security Problem

Hashes can be used in online-bid systems. That is, instead of submitting the actual bits, each customer submits the hash of the bid. This can prevent people from seeing other people's bids and placing a bid just a little bit higher to win the bid.

a. What are the 2 properties of a secure hash function h that this scheme relies on to prevent cheating? Explain your answer (each is worth 1 pts for the name of the property and for explanation).

b. Outline a potential attack on this scheme (hint: when buying/bidding on something, people probably know the range of the price).

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!