Hash function \(H : {\lbrace 0, 1 \rbrace^*} \to \lbrace 0, 1 \rbrace^n\) deterministic
Examples:
Show that collision resistance implies second-preimage resistance of hash functions.
Let \(g : {\lbrace 0, 1 \rbrace^*} \to \lbrace 0, 1 \rbrace^n\) be a collision resistant hash function. Consider the \((n+1)\)-bit hash function \(h\) defined as
\[ h(x) = \begin{cases} 1 \| x & \text{if $|x| = n$,} \\ 0 \| g(x) & \text{otherwise.} \end{cases} \]
Show that \(h\) is collision resistant, but not preimage resistant.
Suppose that \({H_1}, {H_2} : {\lbrace 0, 1 \rbrace^*} \to \lbrace 0, 1 \rbrace^n\) are collision resistant hash functions. Show that the function \({H_3}(x) = {H_2}({H_1}(x))\) is also collision resistant.
Let \(H : {\lbrace 0, 1 \rbrace^*} \to \lbrace 0, 1 \rbrace^n\) be a collision resistant hash function. Which of the following are collision resistant?
Let \(H\) be an iterated hash function with compression function \(f : \lbrace 0, 1 \rbrace^{n+r} \to \lbrace 0, 1 \rbrace^n\). Suppose that you are given an algorithm \(A\), which on input \(z \in \lbrace 0, 1 \rbrace^n\) finds \(s, t \in \lbrace 0, 1 \rbrace^r\), \(s \ne t\), such that \(f(z, s) = f(z, t)\). Let \(T\) be the running time of \(A\), and let \(L = 2^\ell\), where \(\ell\) is a positive integer. Show how \(A\) can be used to find, in time \(\ell T\), a collection of \(L\) pairwise distinct messages \({x_1}, {x_2}, \dots, {x_L}\) such that \(H({x_1}) = H({x_2}) = \dots = H({x_L})\).
z = IV
s, t = lists of length l
for i in range(l):
s[i], t[i] = A(z)
z = f(z, s[i])
Prove that the concatenation of the \(\operatorname{MD5}\) and \(\operatorname{SHA-1}\) hash functions yields no appreciably greater security than \(\operatorname{SHA-1}\) alone. More specifically, show that a collision can be found for the hash function \(H : {\lbrace 0, 1 \rbrace^*} \to \lbrace 0, 1 \rbrace^{288}\) given by
\[ H(x) = \operatorname{MD5}(x) \| \operatorname{SHA-1}(x) \]
using roughly \(C \cdot 2^{80}\) operations, for some reasonably sized constant \(C\).
or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing