What is a cryptographic hash function?
A function that maps input of any size to a fixed-size output.
What is the output of a hash function called?
Hash value or hash code.
What is compression in hash functions?
Producing fixed-size output from variable-size input.
What is efficiency in hash functions?
Hashes can be computed quickly.
What does one-way property mean?
It is infeasible to invert the hash.
What is preimage resistance?
Difficulty of finding x from h(x).
What is weak collision resistance?
Hard to find y ≠ x with h(y)=h(x) given x.
What is strong collision resistance?
Hard to find any x ≠ y with h(x)=h(y).
Why must collisions exist?
Input space is larger than output space.
What is a collision?
Two different inputs producing the same hash.
Why are collisions dangerous?
They undermine integrity and signatures.
What is the main use of hash functions in cryptography?
Digital signatures.
Why are hashes used in signatures?
To avoid signing large messages directly.
What is h(M) in digital signatures?
A fingerprint of message M.
What is the avalanche effect?
Small input changes cause large output changes.
Why is avalanche effect important?
Prevents attackers from predicting hashes.
What advantage does signing h(M) provide?
Improves efficiency and saves bandwidth.
What is the birthday paradox?
High probability of collisions with many samples.
How does birthday paradox affect hashes?
Collisions expected after about 2^(N/2) hashes.
What is the birthday attack?
Finding collisions using birthday paradox.
How many hashes needed for collision in N-bit hash?
About 2^(N/2).
How does hash security compare to symmetric keys?
Hash output must be about twice key length.
What is computational cost to break N-bit hash?
About 2^(N/2) operations.
What is a non-cryptographic hash?
A hash not designed for security.