Hashing Flashcards

(31 cards)

1
Q

Easy to compute H(m)

A

Performance of hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Given H(m), but not m, it’s computationally infeasible to find m

A

One-way property of hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Given H(m), it’s computationally infeasible to find m’ such that H(m’) = H(m)

A

Pre-image resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computationally infeasible to find any pair m1, m2 such that H(m1) = H(m2)

A

Collision resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Too long of a hash

A

Unnecessary overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Too short of a hash

A

Birthday paradox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broken, collisions published in August 2004

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Too weak for serious applications

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Weaknesses were found, but still in use

A

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Collisions in 2^69 hash operations

A

SHA-1 birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

128-bit input digest of four 32-bit words

A

MD5 input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

512-bit message block (sixteen 32-bit words)

A

MD5 input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

128-bit output (four 32-bit words)

A

MD5 output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Each pass uses a table of constants to update output digest

A

MD5 operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Developed by NIST, specified in 1993

A

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Input processed in 512 bit blocks, with same padding as MD5

17
Q

Input message must be < 2^64

18
Q

Message digest output is 160 bits, five 32-bit words

19
Q

Consists of 80 steps

A

Block processing in SHA

20
Q

Output of last step is added to input of first step

A

Block processing in SHA

21
Q

Slower to compute than MD5

A

Speed of SHA1

22
Q

Only works if set of valid messages is limited by some structure

A

Authentication via encryption

23
Q

Unsuitable for message authentication

24
Q

Used to detected random errors, not malicious attacks

25
Attacker can easily modify message and recompute CRC
CRC can only be used to detect random, not malicious errors
26
Attack where additional information is appended onto hash
Length extension attack
27
Build MAC out of a hash function
Hash MAC (HMAC)
28
S(K,m) = H(k xor opad, H(k xor ipad || m))
HMAC
29
opad and ipad are ____ ciphers
stream
30
pad messages with 0x36 and 0x5c
HMAC processing
31