Question

In: Computer Science

Is MD5 hash function is indistinguishable and non-malleable? Explain it.

Is MD5 hash function is indistinguishable and non-malleable? Explain it.

Solutions

Expert Solution

Yes, Message Digest 5 (MD5) hash function is indistinguishable and non-malleable. The two desirable properties of a hash function are:
1) Pseudo-random: The function behaves indistinguishably from a random oracle.
2) Non-malleability: With J(x), it is difficult for generating J(f(x)) for any function f. Malleability is the expander hash design's inherent property. Malleability properties show negative implications for certain hash functions applications' security however, for Cayley hashes though, they give rise to efficient parallel computation algorithms.

MD5 cryptographic hash function should be computationally infeasible to find two distinct messages hashing to the same value however, MD5 fails catastrophically in this regard, unable to meet this requirement.

Thus, a hash function should be indistinguishable from a pseudorandom function and unforgeable or non-malleable when used as a MAC.


Related Solutions

SHOW WORK Draw the hash table that results using the hash function: h(k)=kmod7 to hash the...
SHOW WORK Draw the hash table that results using the hash function: h(k)=kmod7 to hash the keys 41, 16, 40, 47, 10, 55. Assuming collisions are handled by Double hashing. SHOW WORK
C# Programming create a Hash Function
C# Programming create a Hash Function
Network Security: Explain in detail how a hash function could be used for each of the...
Network Security: Explain in detail how a hash function could be used for each of the following applications. Indicate which property or properties of the hash function are being used (one-way property, fixed length output, collision resistance, etc...). 1. to detect unauthorized modification of software program code 2. to identify the same files with different names on a peer-to-peer sharing network
are gas particles distinguishable or indistinguishable
are gas particles distinguishable or indistinguishable
describe a cryptographic hash function and how it is used as a security application need 300...
describe a cryptographic hash function and how it is used as a security application need 300 words
You want to create a good hash function. Which of these properties is the least important...
You want to create a good hash function. Which of these properties is the least important for your hash function to have? Let's say you want to store a collection of unique elements. You would like to be able to search, insert, delete as fast as possible. Which data structure should you use? Let's say you want your hash table to allow load factors greater than 1. You would use:
3. Assume a hash table with 7 locations and the hashing function h(i) = i%7. Show...
3. Assume a hash table with 7 locations and the hashing function h(i) = i%7. Show the hash table that results when the integers are inserted in the order given. (10 points each. Total 30) • 5, 11, 18, 23, 28, 13, 25, with collisions resolved using linear probing • 5, 11, 18, 23, 28, 13, 25, with collisions resolved using quadratic probing • 5, 11, 18, 23, 28, 13, 25, with collisions resolved using chaining.
1. Discuss the difference in linear and non-linear data 2. explain a quadratic function. Write the...
1. Discuss the difference in linear and non-linear data 2. explain a quadratic function. Write the standard form of a quadratic function 3. Explain and write the vertex formula for a quadratic function 4. What is the vertex of a quadratic function? 5. What is the square root property? 6. Write the quadratic formula and explain what this formula is used for> 7. Explain what a complex number is and write the properties of an imaginary unti. 8. Explain the...
what is hash in digital forensic?
what is hash in digital forensic?
1.Describe a design pattern that incents good security behavior. 2.Design a hash function that uses any...
1.Describe a design pattern that incents good security behavior. 2.Design a hash function that uses any desired date as the salt. Demonstrate operation of the function, including input values. Describe benefits and shortcomings of the hash function.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT