Hash Flashcards

1
Q

Hash function general use(6)

A
  1. Digital Signatures
  2. Public key encryption
  3. Integrity verification
  4. Message Authentication
  5. Password protection
  6. Key Agreement protocols and cryptographic protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hash functions main uses(6)

A
  1. Identify files and detect modified files in cloud storage
  2. Identify files in repo in Git
  3. Detect modified files in Host based Intrusion Detection
  4. Detect malicious data in Network based Intrusion Detection
  5. Prove digital artefacts not modified
  6. Blockchain ensure integrity of previous transactions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hash function overview + 3 desired properties + 3 other properties

A
  • many to one function, NOT one to one
  • different files hash to SAME value
  • Any length to Short Fixed length
    1. Preimage Resistance
    2. Second Preimage resistance
    3. Collision Resistance
  • 1 and 2 hardest to crack
  • for n bit function, security in finding hash collision at n/2 bit strength
  1. Fast for integrity, slow for password hashing
  2. Long length, at least 256 bits long
  3. Unpredictable, minute change in M affects many bits in hash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preimage resistance

A
  • computationally infeasible to revert output to get input
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Second preimage resistance

A
  • given input and digest it hashes to, computationally infeasible to find another input with same digest
    -attacker no control over first input
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Collision resistance

A
  • no one able to produce two different inputs that hash to same output
  • attacker can choose two inputs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hash VS Encryption

A

Hash: ensures Integrity
Encryption: ensures confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Using SHA256 on website, sha256sum

A
  1. Click button to download file
  2. Use SHA256 hash algorithm to hash downloaded file
  3. Compare digest with string on webpage to verify right file
    * NOT always mean files not tampered despite hash being real secured, website may be hacked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MD5 dumpster fire

A
  • Colliding Certificates with different identities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Final Notes on Hash

A
  • Use KECCAK
  • do not create or believe in proprietary hashes
  • Sign hash of large file for file integrity
  • use SHA256, SHA512
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Linear Algebra recap

A
  1. Form system of equations
  2. Gaussian elimination to get RREF
  3. Start from bottom row
  4. Find free variables and solve
How well did you know this?
1
Not at all
2
3
4
5
Perfectly