Which of the following is not a desirable property of a cryptographic hash function
Asked 1 year, 4 months ago Show
Viewed 1k times $\begingroup$ I have created a hash function. If I am asked whether it conforms to the definition of a hash function, I only know that it should have a fixed-size output. I use multiplication and adding of every plaintext character with the random number I assigned. Aside from the fixed-size output, what other characteristics must a hash function have, and why? asked Jul 13, 2021 at 0:18
$\endgroup$ 3 $\begingroup$ From a cryptographic standpoint, a hash function with fixed-size output:
More generally, a modern cryptographic hash should broadly behave as a random oracle, that is a box implementing a function, which output is random for every particular input. For large-enough output set, that implies collision-resistance, preimage resistance, and more:
answered Jul 13, 2021 at 7:10
fgrieu♦fgrieu 127k11 gold badges277 silver badges525 bronze badges $\endgroup$ 4 What Are Cryptographic Hash Functions?A cryptographic hash function is a mathematical function used in cryptography. Typical hash functions take inputs of variable lengths to return outputs of a fixed length. A cryptographic hash function combines the message-passing capabilities of hash functions with security properties. Key Takeaways
How Cryptographic Hash Functions WorkHash functions are commonly used data structures in computing systems for tasks, such as checking the integrity of messages and authenticating information. While they are considered cryptographically "weak" because they can be solved in polynomial time, they are not easily decipherable. Cryptographic hash functions add security features to typical hash functions, making it more difficult to detect the contents of a message or information about recipients and senders. In particular, cryptographic hash functions exhibit these three properties:
The three properties outlined above are desirable but they cannot always be implemented in practice. For example, the disparity in sample spaces for input hashes and outputs ensures that collisions are possible. For example, in 2017, the MIT Digital Currency Initiative found collision vulnerability in IOTA. Examples of Cryptographic Hash FunctionsCryptographic hash functions are widely used in cryptocurrencies to pass transaction information anonymously. For example, Bitcoin, the original and largest cryptocurrency, uses the SHA-256 cryptographic hash function in its algorithm. Similarly, IOTA, a platform for the Internet of Things, has its own cryptographic hash function, called Curl. However, hashes have other applications in the real world. These are some of the most common cryptographic applications: Password VerificationStoring passwords in a regular text file is dangerous, so nearly all sites store passwords as hashes. When a user inputs their password, it is hashed and the result is compared to the list of hashed values stored on the company's servers. This is not a fool-proof practice, however, as the Collection #1 trove of 21 million stolen passwords, discovered in 2019, demonstrates. Signature Generation and VerificationVerifying signatures is a mathematical process used to verify the authenticity of digital documents or messages. A valid digital signature, where the prerequisites are satisfied, gives its receiver strong proof that the message was created by a known sender and that the message was not altered in transit. A digital signature scheme typically consists of three algorithms: a key generation algorithm; a signing algorithm that, given a message and a private key, produces a signature; and a signature verifying algorithm. Merkle Trees, a technology used in cryptocurrencies, is a kind of digital signature. Verifying File and Message IntegrityHashes can be used to make sure messages and files transmitted from sender to receiver are not tampered with during transit. The practice builds a "chain of trust." For example, a user might publish a hashed version of their data and the key so that recipients can compare the hash value they compute to the published value to make sure they align. Which of the following is not a property of hash function?Which of the following is not possible through hash value? Explanation: As the hash functions are irreversible and has pre-image resistance property, therefore it is almost impossible to obtain the original data form its hash value.
Which of the following properties must a cryptographic hash function provide?In particular, cryptographic hash functions exhibit these three properties: They are “collision-free.” This means that no two input hashes should map to the same output hash. They can be hidden. It should be difficult to guess the input value for a hash function from its output.
Which property of a cryptographic hash algorithm is desirable?The ideal cryptographic hash function has the following main properties: Deterministic: This means that the same message always results in the same hash. Quick: It is quick to compute the hash value for any given message.
Which one of the following is not a characteristic of a cryptographic hash function?Which is NOT a characteristic of a hash function in cryptography? Once you hash something, you cannot unhash it.
|