Question

In: Computer Science

1.Describe a design pattern that incents good security behavior. 2.Design a hash function that uses any...

1.Describe a design pattern that incents good security behavior.

2.Design a hash function that uses any desired date as the salt. Demonstrate operation of the function, including input values. Describe benefits and shortcomings of the hash function.

Solutions

Expert Solution

1. Describe a design pattern that incents good security behavior.

Security patterns can be connected to accomplish objectives in the region of security. The majority of the old-style configuration patterns have various instantiations to satisfy some data security objective, for example, secrecy, respectability, and accessibility. Furthermore, one can make another structure example to explicitly accomplish some security objective.

The pattern network has given an accumulation of security patterns, which were talked about in workshops at Pattern Dialects of Projects (Thud) meetings. They have been bound together and distributed in a joint venture.

These are patterns that are worried about the accessibility of the benefits. The benefits are either administrations or assets offered to clients.

Registration framework pattern depicts a plan to utilize replication (software engineering) and recuperate when a segment falls flat.

Reserve pattern has the objective to give a fallback part ready to continue the administration of the bombing segment.

Comparator-checked shortcoming tolerant framework pattern gives an approach to screen the disappointment of free conduct of a segment.

Imitated framework pattern depicts a plan of excess parts and a method for burden adjusting and redirection in the middle of to diminish the opportunity of non-accessibility of the administration.

Mistake recognition/rectification pattern has the objective to derive blunders and potentially right them to ensure the right data trade or capacity.

2. Design a hash function that uses any desired date as the salt. Describe the benefits and shortcomings of the hash function.

The issue at hands is to accelerate looking. Think about the issue of looking at an exhibit for a given worth. In the event that the cluster isn't arranged, the inquiry may require looking at each and all components of the exhibit. On the off chance that the exhibit is arranged, we can utilize the parallel hunt, and subsequently diminish the more terrible case runtime multifaceted nature to O(log n). We could look significantly quicker in the event that we know ahead of time the file at which that worth is situated in the exhibit. Assume we do have that enchantment work that would disclose to us the list for a given worth. With this enchantment work, our inquiry is diminished to only one test, giving us a steady runtime O(1). Such a capacity is known as a hash work.

Design Hash Function

At the core of a hashing is a numerical capacity that works on two fixed-size squares of information to make a hash code. This hash capacity shapes the piece of the hashing calculation.

The size of every datum square changes relying upon the calculation. Commonly the square sizes are from 128 bits to 512 bits. The accompanying delineation exhibits hash work −

Hash Capacity Structure

Hashing calculation includes rounds of above hash capacity like a square figure. Each round takes a contribution of a fixed size, commonly a mix of the latest message square and the yield of the last round.

This procedure is rehashed for the same number of rounds as are required to hash the whole message. Schematic of hashing calculation is portrayed in the accompanying delineation −

Hashing Calculation

Since, the hash estimation of first message square turns into a contribution to the second hash activity, yield of which adjusts the aftereffect of the third activity, etc. This impact, known as a torrential slide impact of hashing.

Torrential slide impact brings about considerably unique hash esteems for two messages that vary by even a solitary piece of information.

Comprehend the distinction between hash capacity and calculation accurately. The hash capacity creates a hash code by working on two squares of fixed-length paired information.

Hashing calculation is a procedure for utilizing the hash work, determining how the message will be separated and how the outcomes from past message squares are bound together.

Mainstream Hash Capacities

Operations and Functions

1.Message Digest (MD)

2.Secure Hash Function (SHA)

3.RIPEMD

4.Whirlpool (WHIRLPOOL-0, WHIRLPOOL-T, and WHIRLPOOL.)


Related Solutions

describe a cryptographic hash function and how it is used as a security application need 300...
describe a cryptographic hash function and how it is used as a security application need 300 words
Network Security: Explain in detail how a hash function could be used for each of the...
Network Security: Explain in detail how a hash function could be used for each of the following applications. Indicate which property or properties of the hash function are being used (one-way property, fixed length output, collision resistance, etc...). 1. to detect unauthorized modification of software program code 2. to identify the same files with different names on a peer-to-peer sharing network
You want to create a good hash function. Which of these properties is the least important...
You want to create a good hash function. Which of these properties is the least important for your hash function to have? Let's say you want to store a collection of unique elements. You would like to be able to search, insert, delete as fast as possible. Which data structure should you use? Let's say you want your hash table to allow load factors greater than 1. You would use:
1) Design a study that uses a dependent samples design 2) Design a study that uses...
1) Design a study that uses a dependent samples design 2) Design a study that uses an independent samples design. Be sure to make clear your independent and dependent variables. Base your two studies on the same general idea.
1) Design a study that uses a dependent samples design 2) Design a study that uses...
1) Design a study that uses a dependent samples design 2) Design a study that uses an independent samples design.   Base your two studies on the same general idea.
1) Design a study that uses a dependent samples design 2) Design a study that uses...
1) Design a study that uses a dependent samples design 2) Design a study that uses an independent samples design. Be sure to make clear your independent and dependent variables. Base your two studies on the same general idea.
1. Are there any general patterns to the distribution of the Ensatina salamanders? Describe the pattern...
1. Are there any general patterns to the distribution of the Ensatina salamanders? Describe the pattern that you see. Does the pattern make sense given the information on these salamanders in the background information? Expand on your previous answer. 2. How many distinct populations can you observe based on the location of the specimens (disregard the colors for the time being)? Which colored populations appear to be single population? Explain. Stebbins decided that the Ensatina salamanders were not four separate...
Describe the relationship between stress, cardiovascular disease, and Type A behavior pattern.
Describe the relationship between stress, cardiovascular disease, and Type A behavior pattern.
2) The demand function for a good is ?? = ?(?, ?, ?) = ? −...
2) The demand function for a good is ?? = ?(?, ?, ?) = ? − ?? and its supply function is ?? = ?(?, ?, ?) = ? + ??, where a, b, c, and e are positive constants. (Keep in mind that sometimes we call a, 2 b, c, and e “parameters” and that they are “exogenous” variables. In contrast, p and Q are “endogenous” variables.) a) Solve for the equilibrium price ? ∗ = ? ∗ (?,...
What are the (1) hash algorithm identifier, (2) cost factor, (3) salt, and (4) hash value...
What are the (1) hash algorithm identifier, (2) cost factor, (3) salt, and (4) hash value of the following given hashed password that is generated by bcrypt()? $2y$16$.2Boh8Y80U.RaFr1sFdaKuP5/B2Z3I8OM7vUTUvPzD2UEG3VMcXra
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT