Hash Functions Essay


Description

1. What are the properties of hash functions?

3. Bob calculated a new plot to unmask whether a communication is mitigated by an attacker

(enriching basis probity). The plot is to subjoin to each communication a SHA-256 hash of

that communication. Explain the insecurity of Bob’s sketch

4. Bob calculated another new plot to unmask whether a communication is mitigated by an

attacker (enriching basis probity). The plot is to subjoin to each communication a SHA256

hash of that communication, then encrypt the entire subjoined communication using AES after a while a known

key to the common. Explain the insecurity of Bob’s sketch.

5. A gang is selling an artifact rate millions of dollars. Many zealous buyers are in

the injunction way, which works as follows. Each buyer sends the knowledge of his/her

final calculate (e.g., $1,000,000.00) to the gang to pomp his/her commitment. And the

calculate must be kept trustworthy from other buyers and level the gang precedently the

deadline. After the deadline, all calculates are released to all buyers and the gang, then

the buyer after a while the highest calculate wins. Sketch a HASH FUNCTION established plot to

secure the injunction way. Describe steps a buyer and/or the gang should do

Before deadline.