Computers and Technology

One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer systems. With this method, a password is hashed after itsinput and is compared to the stored (hashed) reference password.

(a) Assume that you are a hacker and you got access to the hashedpassword list. You would like to impersonate some of the users. Discuss which of the following three attacks below allow this. Exactlydescribe the consequences of each of the attacks:

•Attack A: You break the one-way property ofh.
•Attack B: You can find second preimages forh.
•Attack C: You can find collisions forh.

(b) Why is this technique of storing passwords often extended by theuse of a so-calledsalt? (A salt is a random value appended to thepassword before hashing. Together with the hash, the value of saltis stored in the list of hashed passwords.) Are the attacks aboveaffected by this technique?

(c) Is a hash function with an output length of 80 bit sufficient for this application?

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 13:30, gamingisfun
Me ! evelyn is a manager in a retail unit. she wants to prepare a report on the projected profit for the next year. which function can she use? a. pmt b. round c. division d. what-if analysis
Answers: 2
image
Computers and Technology, 23.06.2019 18:40, cyn95xx
Johnson enterprises uses a computer to handle its sales invoices. lately, business has been so good that it takes an extra 3 hours per night, plus every third saturday, to keep up with the volume of sales invoices. management is considering updating its computer with a faster model that would eliminate all of the overtime processing.
Answers: 2
image
Computers and Technology, 24.06.2019 07:00, jared2461
Jean has kept the content of her website limited to what is important; she has also ensured that the text follows a particular style and color all throughout her website. which website features has jean kept in mind? jean has limited the content of her website to what is important; this ensures (clarity, simplicity, harmony and unity) of the content. she has also formatted the text in a particular style and color throughout her website, ensuring (balance, simplicity, consistency)
Answers: 2
image
Computers and Technology, 25.06.2019 02:30, gabby0148
On the pie chart below, which “slice” represents 30% of the budget?
Answers: 2
Do you know the correct answer?
One of the earlier applications of crypto-graphic hash functions was the storage of passwords to aut...

Questions in other subjects:

Konu
Social Studies, 18.09.2019 07:50
Konu
Mathematics, 18.09.2019 07:50