Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please help me in this assignment. Hash Functions: Hash function, H(x) generates a representative compact fingerprint (a hash value) of a given piece of information

Please help me in this assignment.
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
Hash Functions: Hash function, H(x) generates a representative compact fingerprint (a hash value) of a given piece of information x. It takes a variable length messages and generates a hash value (digest) of a fixed size (fixed number of bits). Some applications of hash functions include: Message Integrity Storing password in the form of hash Digital Signatures and others Message or data block M (variable length Hash valoe (fixed length Hash functions for Message Integrity: Source A b) Why do we need to use encryption on top of hash function? Which of the two provides confidentiality also (a) or (b) 2. On the popup window, you can select the hashing function to be used and see the hash value of the message. Also you can modify the original message and see the difference between the hash of the original message and the modified message. You will see that the hash value greatly differs even for a small change in the original message. Can you find another message with the same haslh value? What are three properties that make hash function secure? A digital signature procedure prescribes that a hash value of a message is to be signed, instead of signing the message directly as shown in the figure below. To sign a document, the sender uses his private key. On the other side, the receiver needs the public key of the sender to verify the document -Source A Destination B PU Compare PU Compare EPR, HM) Why do we use private key to encrypt the hash instead of symmetric key as in the case of message integrity? Which of the two provides confidentiality also (a) or (b) 4. Verify the signature Using: Digital Signatures/PKI Verify Signature You should use the same certificate that you used to sign the document. Create a second certificate and try to verify the same document using the second certificate. Were you able to verify it? Now modify the signed document (either the signature part or the message part) and try to verify the modified document. Was the verification

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions