Question

In: Computer Science

Briefly describe some desirable properties of a robust message digest algorithm. Outline two distinct examples of...

Briefly describe some desirable properties of a robust message digest algorithm. Outline two distinct examples of how a message digest algorithm may be employed to ensure the integrity of data.

Solutions

Expert Solution

Message Digest Algorithm

Message digest or a cryptographic hash function is a mathematical algorithm that maps the input data of arbitrary length into a fixed size string called message digest or hash value.

The most common message digest algorithm is MD5

Desirable properties of message digest algorithm are as follows

  • Pre-Image resistance: This property implies that it should be computationally infeasible to reverse the hash function.
  • Second Pre-image resistance: This means that for an input and its hash value it should be hard to find another input with same hash value or message digest.
  • Collision Resistance: This property also called the collision-free hash function which means that no two different message will have the same hash value.

Integrity of data

  • It refers to the validity of the transmitted message. message integrity is ensuring that the message is as it is sent and no alteration or modification is made on it.
  • The common method is to use a hash function that produces a message digest that is difficult to reverse.

Outline two distinct examples of how a message digest algorithm may be employed to ensure the integrity of data

  • Data integrity check(Checksum):
    • It generates a message digest of the transmitting message as a checksum and transmitted along with the message and at the receiver side the message is again given as input to the hash function and create a checksum and both the checksums are compared if they are same then it is sure that the message is not altered.
  • Next method to ensure integrity is the use of Digital Signatures
    • A digital signature is a cryptographic value generated from data and a secret key by the user
    • The hash value of the message and the private key are input for the signature algorithm and generate a signature (Encryption)
    • The signature along with the message is sent to the receiver.
    • receiver create a hash value from the message itself and decrypt the signature using the verification algorithm. (Decryption)
    • if both hash values(Generated and decrypted) if both are same then both authenticity and integrity of the data is ensured.

The outline of the two examples are given in the figure below:


Related Solutions

Research the different hash algorithms (Message Digest, Secure Hash Algorithm, and RIPMD) and then compare them....
Research the different hash algorithms (Message Digest, Secure Hash Algorithm, and RIPMD) and then compare them. Do a write up on the each one of them (3 paragraphs total). Be sure to include the size of the digest, the number of rounds needed to create the hash, block size, who created it, what previous hash it was derived from, and its strengths and weaknesses. For your fourth paragraph, pick one hash algorithm and explain what you would use it for...
describe two examples of properties of electrons that are particle-like
describe two examples of properties of electrons that are particle-like
List and describe five distinct properties of biological membranes.
List and describe five distinct properties of biological membranes.
Describe the desirable materials properties and characteristics of a woofer, mid-range, and tweeter.​
Describe the desirable materials properties and characteristics of a woofer, mid-range, and tweeter.​
a. Enumerate four (4) desirable properties of a good measure of inequality.(8 marks) b. Outline three...
a. Enumerate four (4) desirable properties of a good measure of inequality. b. Outline three (3) reasons why extreme inequality is undesirable. c. Discuss three (3) appropriate policies for reducing the magnitude and extent of absolute poverty in low income countries.
Question: State and define two properties of an estimator of a population parameter that are desirable.
Question: State and define two properties of an estimator of a population parameter that are desirable.
Describe the distinct components of Computer Physician Order Entry (CPOE) and provide some specific examples of...
Describe the distinct components of Computer Physician Order Entry (CPOE) and provide some specific examples of this system and how they are used in the healthcare environment including the challenges this system creates.
List and briefly describe two examples of specialization in the innate immune system and two examples...
List and briefly describe two examples of specialization in the innate immune system and two examples of specialization in the adaptive immune system
Outline four (4) important functional properties of microorganisms in fermented foods and give two (2) examples...
Outline four (4) important functional properties of microorganisms in fermented foods and give two (2) examples each of associated microbes.
Identify and briefly discuss any two properties of steel structure. Briefly discuss two properties that you...
Identify and briefly discuss any two properties of steel structure. Briefly discuss two properties that you have selected for part a) in the context of a structural steel design.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT