Question
PLEASE DO NOT COPY NO PLAGIARISM (ONLY ATTEMPT THE QUESTION IF U R GOING TO DO ALL THANKS 1. One class of weak data integrity
PLEASE DO NOT COPY NO PLAGIARISM (ONLY ATTEMPT THE QUESTION IF U R GOING TO DO ALL THANKS
1. One class of weak data integrity mechanisms (which we did not discuss in any detail) can only detect accidental modification of data. (a) A single parity check bit consists of the XOR of all the bits in the data. What types of accidental errors will this simple integrity mechanism detect?
(b) In what ways are cyclic redundancy checks (CRCs) better data integrity mechanisms than parity check bits?
(c) Explain why a CRC is not a strong data integrity mechanism. (d) Identify two different applications that use CRCs to provide data integrity and explain why they do not need a stronger data integrity mechanism.
2. By considering the analogy of a birthday being a hash of a persons identity, explain the following terms: (a) preimage resistance;
(b) second preimage resistance;
(c) collision resistance;
(d) the birthday paradox.
4. Explain which of the practical and security properties of a hash function are most useful for the following applications:
(a) storing a passphrase;
(b) generating a short-lived key by hashing a long-term key;
(c) HMAC;
(d) digital signature schemes with appendix;
(e) computer virus detection.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started