Question
2) Security of Cryptographic Hash Functions and Their Secure Use in Applications (see hash functions slide, and remember in-class discussions): a. What is the birthday
2) Security of Cryptographic Hash Functions and Their Secure Use in Applications (see hash functions slide, and remember in-class discussions): a. What is the birthday attack against hash functions? Given an n-bit hash output, mathematically formulate the upper bound of collision probability of it. Specifically, write how the birthday paradox is formulated. You can use approximations if needed. You need to provide mathematical proof to receive credit, simple verbal descriptions receive no partial credit. b. In slides 10-14, we discussed 4 levels/types of security for the hash functions. i. What are rainbow tables in computer security? Briefly describe them and explain which types of hash functions among these types are used for rainbow tables ii. Among these four levels, one of them achieves the highest level of security against collusion attacks. Given the n-bit hash, and a similar size auxiliary input that it requires, what is the collusion probability at that level compared to the birthday attack against level other three levels? c. HMAC construction. (i) What is HMAC, write its formula. (ii) Why it is important to follow a specific padding mechanism (as opposed to the basic concatenation of the key) in HMAC construction when the MD approach discussed in the class is used?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started