11. Hash Functions Flashcards

(50 cards)

1
Q

What is a cryptographic hash function?

A

A function that maps input of any size to a fixed-size output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the output of a hash function called?

A

Hash value or hash code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is compression in hash functions?

A

Producing fixed-size output from variable-size input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is efficiency in hash functions?

A

Hashes can be computed quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does one-way property mean?

A

It is infeasible to invert the hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is preimage resistance?

A

Difficulty of finding x from h(x).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is weak collision resistance?

A

Hard to find y ≠ x with h(y)=h(x) given x.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is strong collision resistance?

A

Hard to find any x ≠ y with h(x)=h(y).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why must collisions exist?

A

Input space is larger than output space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a collision?

A

Two different inputs producing the same hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are collisions dangerous?

A

They undermine integrity and signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main use of hash functions in cryptography?

A

Digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why are hashes used in signatures?

A

To avoid signing large messages directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is h(M) in digital signatures?

A

A fingerprint of message M.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the avalanche effect?

A

Small input changes cause large output changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is avalanche effect important?

A

Prevents attackers from predicting hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What advantage does signing h(M) provide?

A

Improves efficiency and saves bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the birthday paradox?

A

High probability of collisions with many samples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does birthday paradox affect hashes?

A

Collisions expected after about 2^(N/2) hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the birthday attack?

A

Finding collisions using birthday paradox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How many hashes needed for collision in N-bit hash?

A

About 2^(N/2).

22
Q

How does hash security compare to symmetric keys?

A

Hash output must be about twice key length.

23
Q

What is computational cost to break N-bit hash?

A

About 2^(N/2) operations.

24
Q

What is a non-cryptographic hash?

A

A hash not designed for security.

25
Why are simple hashes insecure?
They have short output and structure.
26
Give an example of non-cryptographic hash.
CRC.
27
What is CRC?
Cyclic Redundancy Check.
28
What is CRC mainly used for?
Detecting transmission errors.
29
Why is CRC unsuitable for security?
Collisions are easy to find.
30
Where was CRC misused?
WEP protocol.
31
What is algebraic structure in hashes?
Predictable mathematical patterns.
32
Why is algebraic structure bad?
Makes collisions easy.
33
What is a fingerprint in hashing?
A short identifier of data.
34
How many bits typically change in good hash?
About half.
35
What happens if M changes slightly?
h(M) changes significantly.
36
What is strong avalanche effect?
Outputs are uncorrelated after small changes.
37
Why must hashes be efficient?
Otherwise signing becomes expensive.
38
When is a hash considered secure?
When no practical collisions are known.
39
What trade-off exists in hash design?
Efficiency vs security.
40
How is hash design similar to block ciphers?
Uses rounds and diffusion.
41
What attack forces exhaustive search?
Good avalanche effect.
42
What is exhaustive collision search?
Trying many inputs to find collisions.
43
Name modern hash functions.
SHA-256, MD6.
44
What security property supports integrity?
Collision resistance.
45
What property supports password storage?
One-way property.
46
Why are hash outputs fixed length?
For compression and comparison.
47
What is the main lesson of birthday attacks?
Longer hashes are needed for security.
48
What is the bottom-line rule for hash size?
Output should be about twice key size.
49
What role do hashes play in authentication?
Verify data integrity and origin.
50
What happens if collisions are easy?
Signatures and integrity fail.