Hash functions comp security

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

What were code books in the nineteenth century used for?

1 / 35

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

36 Terms

1

What were code books in the nineteenth century used for?

They protected and shortened transactions, mapping words or phrases to fixed-length groups of letters or numbers.

New cards
2

What is a hash function used for in cryptography?

It protects the integrity and authenticity of messages, preventing manipulation of ciphertext to cause predictable changes in plaintext.

New cards
3

Why did banks realize that stream ciphers and code books were inadequate?

They didn't protect message authenticity, making it possible for an attacker to substitute codewords, like changing ‘1000’ to ‘1,000,000.’

New cards
4

What is a one-way function in cryptography?

A function where a test key can be computed from a message, but it’s impossible to reverse the process and recover the message or key.

New cards
5

What is an asymmetric cryptosystem?

A system where different keys are used for encryption and decryption, such as using a public key to encrypt and a private key to decrypt.

New cards
6

What is the purpose of a digital signature in cryptography?

To sign a message with a private key and allow anyone to verify it using the public signature verification key.

New cards
7

Why is a 64-bit block cipher inadequate for message security?

Forging a message would be too easy, requiring the cost of only a small number of messages.

New cards
8

What was significant about Wang, Yiqun Lisa Yin, and Hongbo Yu's work on SHA-1?

They worked on SHA-1 developed an algorithm to find collisions, showing that SHA-1 was vulnerable, leading to a shift to stronger hash functions like SHA-2.

New cards
9

What is the risk of hash collisions in forensic systems?

A collision would signal tampering, triggering further investigation to see whether evidence was altered.

New cards
10

What is a Merkle tree in cryptography?

It is a structure that hashes multiple inputs into a single output, often used in code signing and blockchain applications.

New cards
11

How does key updating work in cryptography?

It involves hashing a shared key at agreed times to prevent an attacker from decrypting past traffic if they compromise a system.

New cards
12

What is forward security in cryptography?

It ensures that once a compromised system exchanges a message with an uncompromised one, security is recovered.

New cards
13

What is autokeying in cryptography?

It involves updating a key by hashing it with exchanged messages, recovering security after the next exchange the attacker can't observe. It ensures that once an attacker misses an exchange, security can be restored, making it harder to compromise ongoing communications.

New cards
14

What cryptographic system was first used in EFT payment terminals in Australia?

Forward security with asymmetric cryptography was first used.

New cards
15

What is the modern approach to authenticated encryption?

Using a mode of operation designed for authenticated encryption, avoiding weak hash functions like MD5.

New cards
16

Why is it difficult to reverse a one-way function?

Because the test key doesn't contain enough information to recover the original message or key.

New cards
17

What is the potential threat to public key cryptography systems?

False public keys can be inserted into the system, or the systems themselves can be hacked or coerced.

New cards
18

What was a major vulnerability of SHA-1?

The major vulnerability of SHA-1 was an algorithm was developed that could find collisions, weakening its security and leading to its replacement with stronger hash functions like SHA-2.

New cards
19

What is the role of hash functions in legal forensics?

They ensure the integrity of digital evidence, helping to detect if tampering has occurred.

New cards
20

What is the significance of a hash function in digital timestamping?

It allows you to prove that a document existed at a certain time without revealing its content until later.

New cards
21

Why are Merkle trees important in blockchain technology?

They efficiently hash large data structures and allow secure verification of transactions in a blockchain.

New cards
22

Why do some forensic investigators continue to use MD5 despite its vulnerabilities?

Its collisions don’t present useful attacks in their specific applications, making it still suitable for certain non-critical uses.

New cards
23

What is a collision in the context of hash functions?

It occurs when two different inputs produce the same hash value, potentially compromising the security of the system.

New cards
24

What role do hash functions play in key updating and autokeying?

They are used to generate new keys securely, ensuring that compromised keys cannot decrypt older messages.

New cards
25

Why is authenticated encryption considered a modern approach?

It ensures both the confidentiality and integrity of data, protecting against both message tampering and unauthorized access.

New cards
26

How can a hash function be constructed from a block cipher?

By feeding message blocks one at a time to the key input of the block cipher and using feedforward, where each hash value is XOR’ed with the output of the next round, making the operation non-invertible.

New cards
27

What is the relation between block ciphers and hash functions

Hash functions can be constructed from block ciphers, and vice versa. Both can be derived from stream ciphers under certain conditions, making them flexible cryptographic primitives.

New cards
28

How did cryptanalysis progress with MD5?

MD5, which has four rounds and a 128-bit hash value, was broken in 2004 by Xiaoyun Wang and colleagues, making it vulnerable to collisions and insecure for digital certificates.

New cards
29

What is the status of SHA-1 in cryptography?

SHA-1, introduced in 1995 with a 160-bit hash value, was considered insecure after a collision was found in 2017. It has since been replaced by stronger algorithms like SHA-2.

New cards
30

What improvements does SHA-2 offer over SHA-1?

SHA-2, which comes in 256-bit and 512-bit versions, is more secure than SHA-1, with its larger hash sizes providing better resistance to collisions and attacks.

New cards
31

What is the main use of HMAC in cryptography?

it provides message integrity and authentication by hashing a message with a key. It involves two rounds of hashing, making it resistant to certain types of collision attacks.

New cards
32

What is the significance of "preimage resistance" in a hash function?

It ensures that, given a hash output, it is computationally infeasible to reverse the process and find the original input. This is crucial for protecting the secrecy of data.

New cards
33

what attack exploits a paradox

The birthday attack exploits the birthday paradox to find collisions in a hash function faster than brute force. It significantly reduces the complexity of finding a hash collision, hence requiring larger hash sizes for security.

New cards
34

what security did blue ray use

A 128-bit cipher such as AES used to be just about adequate, and in fact the AACS content protection mechanism in Blu-ray DVDs used ‘AES-H’, the hash function derived from AES in this way.

New cards
35

backward security

The point is that if an attacker compromises one of their systems and steals the key, he only gets the current key and is unable to decrypt back traffic. The chain of compromise is broken by the hash function's one-wayness.

New cards
36

The use of asymmetric cryptography allows

slightly stronger form of forward security, namely that as soon as a compromised terminal exchanges a message with an uncompromised one which the opponent doesn't control, security can be recovered even if the message is in plain sight.

New cards

Explore top notes

note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 16 people
... ago
4.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 69 people
... ago
5.0(3)
note Note
studied byStudied by 18 people
... ago
4.5(2)

Explore top flashcards

flashcards Flashcard (80)
studied byStudied by 13 people
... ago
4.0(1)
flashcards Flashcard (73)
studied byStudied by 15 people
... ago
4.5(2)
flashcards Flashcard (65)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 242 people
... ago
5.0(5)
flashcards Flashcard (79)
studied byStudied by 12 people
... ago
5.0(1)
flashcards Flashcard (80)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (81)
studied byStudied by 228 people
... ago
5.0(4)
robot