0% found this document useful (0 votes)
24 views4 pages

Chapter 11 - Cryptographic Hash Functions Flashcards - Quizlet

Chapter 11 discusses cryptographic hash functions, which take variable-length input data and produce a fixed-size hash value, ensuring data integrity and message authentication. Key properties include preimage resistance, collision resistance, and efficiency, with various algorithms like SHA-1, SHA-256, and SHA-3 highlighted. The chapter also covers attacks on hash functions, such as collision attacks and brute force attacks, emphasizing the importance of secure hash algorithms in protecting data.

Uploaded by

moweso87
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views4 pages

Chapter 11 - Cryptographic Hash Functions Flashcards - Quizlet

Chapter 11 discusses cryptographic hash functions, which take variable-length input data and produce a fixed-size hash value, ensuring data integrity and message authentication. Key properties include preimage resistance, collision resistance, and efficiency, with various algorithms like SHA-1, SHA-256, and SHA-3 highlighted. The chapter also covers attacks on hash functions, such as collision attacks and brute force attacks, emphasizing the importance of secure hash algorithms in protecting data.

Uploaded by

moweso87
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Chapter 11: Cryptographic Hash Functions

Save

Students also studied

Flashcard sets Study guides

Module 2 ITN 262 QUIZ chapter 6 Chapter 13: Digital Signatures AFH 1 CHAPTER 17 SECURITY SECTI... SY0-60

46 terms 21 terms 44 terms 100 term

Skilltastic1 Preview jal0040 Preview michael_easter55 Preview Me

Get a taste for our practice questions

Learn 1 /7 Study with Learn

a scheme in which a hash of a password is stored by an operating system rather than the

password itself.

Give this one a try later!

one-way password file 2 cryptographic hash function

3 collision 4 Keyed hash function

Don't know?

H accepts a variable-length block of data M as input and produces a fixed-size hash


hash function
value h=H(M)

data integrity the principal object of a hash function

a ________ to any bit or bits in M results, with high probability, in a change to the hash
change
value

needed for security applications. algorithm for which it is computationally infeasible

cryptographic hash function to find either 1) a data object that maps to a pre-specified has result or 2) two data

objects that map to the same hash result


message authentication is a mechanism or service used to verify the integrity of a message.

When a hash function is used to provide message authentication, the hash function
message digest
value is often referred to as

secure the hash value must be transmitted in a ________ fashion.

A key-dependent, one-way hash function that allows only specific recipients


Message Authentication Code (MAC)
(symmetric key holders) to access the message digest.

Keyed hash function aka message authentication code

digital signature hash value is encrypted with with a user's private key. similar to a MAC

a scheme in which a hash of a password is stored by an operating system rather than


one-way password file
the password itself.

The process of identifying attempts or actions to penetrate a system and gain


intrusion detection
unauthorized access

Virus detection The process of detecting possible malicious software and files in a computer system

pseudorandom function a cryptographic has function can be used to create a

preimage h=H(x), we say that x is the _______ of h

collision occurs when x not equal to y and H(x) = H(y)

variable input size, fixed output size, requirements for the practical application of a hash function

efficiency

is the one-way property. It is easy to generate a code given a message but virtually
preimage resistant
impossible to do the inverse.

Property of a cryptographic hash function where it is computationally infeasible to

find any second input which has the same output as any specified input.

second preimage resistant For any given input x, it is computationally infeasible to find input y != x with Hash(y) =

Hash(x).

(Weak collision resistant)

has variable input size, fixed output size, efficiency, preimage resistant and second
weak hash function
preimage resistant

strong hash function has properties of weak hash function plus collision resistant.

pseudorandomness not traditionally listed as a requirement of chf but is implied.

brute force attack depends only on the bit length of the hash value

Cryptanalysis attack based on weaknesses in a particular crypto function

preimage or second preimage attacks an adversary wishes to find a value y such that H(y) is equal to a given hash value h.

an adversary wishes to find two messages or data blocks, x and y that yield that
collision resistant attacks
same hash function

it is possible to find a collision of a hash function but rare. and takes a lot of
Birthday Paradox
effort/time.

takes a fixed length input and returns a shorter, fixed-length output with the final
compression function
output being the hash value for the message.

Cryptanalysis attack that tries to uncover a mathematical problem from two different
meet-in-the-middle-attack
ends.

A secure hash algorithm that creates more secure hash values than Message Digest
Secure Hash Algorithm (SHA)
(MD) algorithms.
takes an input message and partitions it into fixed-sized blocks. Each block is

sponge construction processed in turn with the output of each iteration fed into the next iteration, finally

producing an output block.

each iteration, the input block is processed by being padded with zeroes to extend

its length from r bits to b bits. Then bitwise XOR of the extended message block and
absorbing phase
s is formed to create a b-bit input to the iteration function f. The output of f is the

value of s for the next iteration.

he first r bits of the state are returned as output blocks, inter-leaved with

squeezing phase applications of the function f. The number of output blocks is chosen at will by the

user.

Birthday Attack a probability method of finding a collision in a hash function

bitrate the number of bits per second a system can transmit

capacity the maximum amount that something can contain.

This function operates to update each bit based on its current value and the value of
chi step function collision resistant
the corresponding bit position in the next two lanes in the same row.

A function that maps a bit string of arbitrary length to a fixed length bit string.

Approved hash functions satisfy the following properties:

1. (One-way) It is computationally infeasible to find any input which maps to any pre-
Cryptographic Hash Function
specified output, and

2. (Collision resistant) It is computationally infeasible to find any two distinct inputs

that map to the same output.

A method of coding to obtain a search key for the purpose of storing and retrieving
hash code
items of data.

A number produced by a hash function to create a unique digital "fingerprint" that


hash value
can be used to allow or deny access to a software application.

This function combines each array element with a round constant that differs for
iota step function
each round. It breaks up any symmetry induced by the other four routines.

The integrity hash algorithms chosen as the next standard for hashing, also known as
keccak
SHA-3.

is an algorithm that uses a cryptographic key AND a cryptographic hash function to


keyed hash function
produce a message authentication code that is keyed and hashed

cryptographic hash function submitted to the NIST hash function competition. It re-
lane
uses many components from AES in a custom construction

little endian if the least significant byte is transmitted first or stored on the lower address

is a message digest algorithm (the fourth in a series) designed by Professor Ronald

MD4 Rivest of MIT in 1990. It implements a cryptographic hash function for use in message

integrity checks. The digest length is 128 bits.

message-digest algorithm that is a one-way cryptographic function that accepts a

MD5 message of any length as input and returns as output a fixed-length digest value to

be used for authenticating the original message.

Pi step function is a permutation of lanes: the lanes move position within the 5×5 matrix.

consists of a simple permutation (circular shift) within each lane. The intent is to

Rho step function provide diffusion within each lane. Without this function diffusion between lanes

would be very slow.

Second preimage resistant (weak collision is the property of a hash function that it is computationally infeasible to find any

resistant) second input that has the same output as a given input
most often used to verify that a file has been unaltered. This is done by producing a

checksum before the file has been transmitted, and then again once it reaches its
SHA-1
destination. The transmitted file can be considered genuine only if both checksums

are identical.

a one-way hash function that provides 112 bits of security, which is the generally
SHA-224
accepted strength of Triple-DES [3DES]

SHA-256 is a patented cryptographic hash function that outputs a value that is 256 bits long

Designed by NSA. 224/256/384/512 bit output size, up to 1600 bit block size, 64 bit
SHA-3
word size, 24 rounds.

belongs to the SHA-2 family of cryptographic hashes. It produces the 384 bit digest
SHA-384
of a message. is roughly 50% faster than SHA-224 and SHA-256

a hashing algorithm used to convert text of any length into a fixed-size string. Each

SHA-512 output produces a length of 512 bits (64 bytes). This algorithm is commonly used for

email addresses hashing, password hashing, and digital record verification.

A property of a hash function such that it is computationally infeasible to find any

Strong Collision Resistance pair (x, y) such that H(x) = H(y). In other words, it is hard to find ANY two values with

the same hash value. Not susceptible to birthday attack.

provides a high level of diffusion on average and that without it, the round function
Theta step function
would not provide diffusion of any significance.

A property of a hash function such that it is computationally infeasible to find y ≠x


with
Weak Collision Resistance
H(y) = H(x). In other words, to find two different values with the same hash value. Still

susceptible to birthday attack.

You might also like