Please help me in this assignment.
Hash Functions: Hash function, H(x) generates a representative compact fingerprint (a hash value) of a given piece of information x. It takes a variable length messages and generates a hash value (digest) of a fixed size (fixed number of bits). Some applications of hash functions include: Message Integrity Storing password in the form of hash Digital Signatures and others Message or data block M (variable length Hash valoe (fixed length Hash functions for Message Integrity: Source A b) Why do we need to use encryption on top of hash function? Which of the two provides confidentiality also (a) or (b) 2. On the popup window, you can select the hashing function to be used and see the hash value of the message. Also you can modify the original message and see the difference between the hash of the original message and the modified message. You will see that the hash value greatly differs even for a small change in the original message. Can you find another message with the same haslh value? What are three properties that make hash function secure? A digital signature procedure prescribes that a hash value of a message is to be signed, instead of signing the message directly as shown in the figure below. To sign a document, the sender uses his private key. On the other side, the receiver needs the public key of the sender to verify the document -Source A Destination B PU Compare PU Compare EPR, HM) Why do we use private key to encrypt the hash instead of symmetric key as in the case of message integrity? Which of the two provides confidentiality also (a) or (b) 4. Verify the signature Using: Digital Signatures/PKI Verify Signature You should use the same certificate that you used to sign the document. Create a second certificate and try to verify the same document using the second certificate. Were you able to verify it? Now modify the signed document (either the signature part or the message part) and try to verify the modified document. Was the verification