Question

3 Brute Force Attack vs Birthday Attack (50 pts) Message-Digest Algorithm (MD5) and Secure Hash Algorithm 1 (SHA-1) are com-
perform An adversary an attack to a hash algorithm by applying random inputs can and y (y) that satisfie Hx) and repeating un

produce (b) What is the expected number of trials needed hash collision probability of 0.9 to a when SHA-1 is used? (6 pts) 3
3 Brute Force Attack vs Birthday Attack (50 pts) Message-Digest Algorithm (MD5) and Secure Hash Algorithm 1 (SHA-1) are com- monly used cryptographic hash functions 1. Do research to find the numbers of bits used in MD5 and SHA-1. (8 pts)
perform An adversary an attack to a hash algorithm by applying random inputs can and y (y) that satisfie Hx) and repeating until finding two inputs H(y) where H() denotes a hash code. This is called a "hash collision." adversary is trying to find a hash collision using a brute force attack 2. Suppose that an (a) What is the expected number of trials needed to produce a hash collision probability of 0.9 when MD5 is used? (20 pts)
produce (b) What is the expected number of trials needed hash collision probability of 0.9 to a when SHA-1 is used? (6 pts) 3. Suppose that an adversary is trying to find a hash collision using a birthday attack (a) What is the expected number of trials needed to produce a hash collision probability of 0.9 when MD5 is used? (8 pts) (b) What is the expected number of trials needed to produce hash collision probability of 0.9 a when SHA-1 is used? (8 pts)
0 0
Add a comment Improve this question Transcribed image text
Answer #1

2.A) 0я, Ткad mofas. 128 (iw-1) d 2 ю A 128 O. 2123 , 2аm Gr-)! 2 128 о о9х2.2 7 3 Gven t the Collision o.9 noot (olisos фно

Add a comment
Know the answer?
Add Answer to:
3 Brute Force Attack vs Birthday Attack (50 pts) Message-Digest Algorithm (MD5) and Secure Hash Algorithm 1 (SHA...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 3 Brute Force Attack vs. Birthday Attack (50 pts) Message-Digest Algorithm (MD5) and Secure Hash Algorithm 1 (SHA-1...

    3 Brute Force Attack vs. Birthday Attack (50 pts) Message-Digest Algorithm (MD5) and Secure Hash Algorithm 1 (SHA-1) are com- monly used cryptographic hash functions 1. Do research to find the mmbers of bits used in MDS and SHA-1. (8 pts) 3 Brute Force Attack vs. Birthday Attack (50 pts) Message-Digest Algorithm (MD5) and Secure Hash Algorithm 1 (SHA-1) are com- monly used cryptographic hash functions 1. Do research to find the mmbers of bits used in MDS and SHA-1....

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT