Question

In: Computer Science

Is MD5 hash function is indistinguishable and non-malleable? Explain it.

Is MD5 hash function is indistinguishable and non-malleable? Explain it.

Solutions

Expert Solution

Yes, Message Digest 5 (MD5) hash function is indistinguishable and non-malleable. The two desirable properties of a hash function are:
1) Pseudo-random: The function behaves indistinguishably from a random oracle.
2) Non-malleability: With J(x), it is difficult for generating J(f(x)) for any function f. Malleability is the expander hash design's inherent property. Malleability properties show negative implications for certain hash functions applications' security however, for Cayley hashes though, they give rise to efficient parallel computation algorithms.

MD5 cryptographic hash function should be computationally infeasible to find two distinct messages hashing to the same value however, MD5 fails catastrophically in this regard, unable to meet this requirement.

Thus, a hash function should be indistinguishable from a pseudorandom function and unforgeable or non-malleable when used as a MAC.


Related Solutions

SHOW WORK Draw the hash table that results using the hash function: h(k)=kmod7 to hash the...
SHOW WORK Draw the hash table that results using the hash function: h(k)=kmod7 to hash the keys 41, 16, 40, 47, 10, 55. Assuming collisions are handled by Double hashing. SHOW WORK
3. Draw the hash table that results using the hash function: h(k)=kmod 7 to hash the...
3. Draw the hash table that results using the hash function: h(k)=kmod 7 to hash the keys 50, 700, 76, 85, 92, 73, 101. Assuming collisions are handled by Quadratic probing. Don't write a program. Just please manually solve the problem. Thanks.
C# Programming create a Hash Function
C# Programming create a Hash Function
Network Security: Explain in detail how a hash function could be used for each of the...
Network Security: Explain in detail how a hash function could be used for each of the following applications. Indicate which property or properties of the hash function are being used (one-way property, fixed length output, collision resistance, etc...). 1. to detect unauthorized modification of software program code 2. to identify the same files with different names on a peer-to-peer sharing network
Develop an algorithm to demonstrate hashing using hash table with modulo as the hash function. Assume...
Develop an algorithm to demonstrate hashing using hash table with modulo as the hash function. Assume the size of the hash table as 10. To avoid collisions in case of identical keys for two different elements, use Linear Probing collision resolution technique. using c++ add comment on the code
are gas particles distinguishable or indistinguishable
are gas particles distinguishable or indistinguishable
describe a cryptographic hash function and how it is used as a security application need 300...
describe a cryptographic hash function and how it is used as a security application need 300 words
You want to create a good hash function. Which of these properties is the least important...
You want to create a good hash function. Which of these properties is the least important for your hash function to have? Let's say you want to store a collection of unique elements. You would like to be able to search, insert, delete as fast as possible. Which data structure should you use? Let's say you want your hash table to allow load factors greater than 1. You would use:
1.Consider hashing with a table size of 100 and a hash function of key%tablesize. Insert 25...
1.Consider hashing with a table size of 100 and a hash function of key%tablesize. Insert 25 keys. Do you expect to see any collisions? Why or why not? Yes, because random values likely will land on same locations. No becase there are four times as many slots as needed. 2. Secondary clustering means that elements that hash to the same position will probe to the same alternate cells. Simple hashing uses key%tablesize as the hash function. Which of the following...
3. Assume a hash table with 7 locations and the hashing function h(i) = i%7. Show...
3. Assume a hash table with 7 locations and the hashing function h(i) = i%7. Show the hash table that results when the integers are inserted in the order given. (10 points each. Total 30) • 5, 11, 18, 23, 28, 13, 25, with collisions resolved using linear probing • 5, 11, 18, 23, 28, 13, 25, with collisions resolved using quadratic probing • 5, 11, 18, 23, 28, 13, 25, with collisions resolved using chaining.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT