Question: a. Consider the following hash function. Messages are in the form of a sequence of numbers in Zn, M (a1, a2, = at). The
a. Consider the following hash function. Messages are in the form of a sequence of numbers in Zn, M (a1, a2, = at). The hash value h is calculated for some predefined value n. Does this hash as ... function satisfy any of the requirements for a hash function listed in Table 11.1? Explain your answer. b. Repeat part (a) for the hash function -( (0)) c. Calculate the hash function of part (b) for M = (189, 632, 900, 722, 349) and n = 989. h = mod n. Table 11.1 Requirements for a Cryptographic Hash Function H Requirement Variable input size Fixed output size Efficiency Preimage resistant (one-way property) Second preimage resistant (weak collision resistant) Collision resistant (strong collision resistant) Pseudorandomness Description H can be applied to a block of data of any size. H produces a fixed-length output. H() is relatively easy to compute for any given , making both hardware and software implementations practical. For any given hash value h, it is computationally infeasible to find y such that H(y) =h. For any given block z, it is computationally infeasible to find y + z with H(y) = H (z). # It is computationally infeasible to find any pair (x,y) with #y, such that H(x) - H(y). x Output of H meets standard tests for pseudorandomness.
Step by Step Solution
There are 3 Steps involved in it
Lets examine the given hash functions based on the requirements listed in Table 111 Part a The hash value h is calculated as h sumi1t ai for some pred... View full answer
Get step-by-step solutions from verified subject matter experts
