Question
1. Answer the discussion board questions below regarding cryptographic hash functions: a. What is the birthday paradox? Have you ever been in a group of
1. Answer the discussion board questions below regarding cryptographic hash functions:
a. What is the birthday paradox? Have you ever been in a group of people where someone had the same birthday as yours? What is the probability that this could ever happen?
b. How can the birthday paradox be used to determine the strength of any of the secure hash algorithms (SHA) in terms of the length of the hash (m)?
c. Look up SHA-3 on Wikipedia or other website. Is there any other name used for SHA-3 besides SHA-3? Does SHA-3 use a Merkle-Damgaard construction? If not, what type of computation is SHA-3 based on?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started