subject

One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer systems. With this method, a password is hashed after itsinput and is compared to the stored (hashed) reference password.

(a) Assume that you are a hacker and you got access to the hashedpassword list. You would like to impersonate some of the users. Discuss which of the following three attacks below allow this. Exactlydescribe the consequences of each of the attacks:

•Attack A: You break the one-way property ofh.
•Attack B: You can find second preimages forh.
•Attack C: You can find collisions forh.

(b) Why is this technique of storing passwords often extended by theuse of a so-calledsalt? (A salt is a random value appended to thepassword before hashing. Together with the hash, the value of saltis stored in the list of hashed passwords.) Are the attacks aboveaffected by this technique?

(c) Is a hash function with an output length of 80 bit sufficient for this application?

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 11:00
What are two of the most common reasons that peolpe who need mental health care do not access it?
Answers: 1
question
Computers and Technology, 22.06.2019 19:30
When creating a presentation in libre office impress, where does the editing of slides take place? a. the slides panel b. the center panel c. the tasks panel, under the masters pages tab d. the tasks panel, under the layouts tab
Answers: 3
question
Computers and Technology, 23.06.2019 00:30
Which one of the following is considered a peripheral? a software b mouse c usb connector d motherboard
Answers: 2
question
Computers and Technology, 23.06.2019 12:00
What does the level 1 topic in a word outline become in powerpoint? a. first-level bullet item b. slide title c. third-level bullet item d. second-level bullet item
Answers: 1
You know the right answer?
One of the earlier applications of crypto-graphic hash functions was the storage of passwords to aut...
Questions
Questions on the website: 13722363