Say you are given a hash function that produces a 224-bit digest, along with a message digest d. Using random guessing, how long would you expect it to take to find a preimage? Say you are given a 224-bit hash function as in the previous question. Using random guessing, roughly how long should it take to find two messages with the same digest?

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Say you are given a hash function that produces a 224-bit digest, along with a message digest d. Using random guessing, how long would you expect it to take to find a preimage?

 

Say you are given a 224-bit hash function as in the previous question. Using random guessing, roughly how long should it take to find two messages with the same digest?

Expert Solution
Step 1

In both math and cryptography, given a capacity H from set A to set B, and a component b in B, a preimage of b by H is any an in A to such an extent that H(a)=b.

In cryptography, a public capacity H from set A to limited set B is:

First-preimage-safe when for a given arbitrary b in B, it is difficult to display a preimage of b, or at least, an in A with H(a)=b.
Second-preimage-safe when for a given arbitrary a0 in A, it is difficult to display another preimage of b=H(a0), that is, an in A with a≠a0 and H(a)=H(a0).
A preimage can on a fundamental level be found by attempting different upsides of an in A (other that a0 for second-preimage), and figuring H(a) until it matches b (the given b for first-preimage, or b=H(a0) processed from the given a0 for second-preimage). Contingent upon the meaning of H, there can be better strategies.

A typical plan objective of down to earth cryptographic hash capacities is that the normal work to find a preimage (of one or the other kind) isn't substantially less than |B|/twice the work for figuring H(a) once, where the documentation |B| assigns the quantity of components in the set B. At the point when B is the arrangement of precisely n-bit bitstrings {0,1}n (as is normal for cryptographic hashes) the amount |B|/2 becomes 2n−1.

trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Hash Table
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education