subject

One of the earlier applications of cryptographic hash functions was the storage
of passwords for user authentication in computer systems. with this method, a
password is hashed after its input and is compared to the stored (hashed) reference
password. people realized early that it is sufficient to only store the hashed versions
of the passwords.

1. assume you are a hacker and you got access to the hashed password list. of
course, you would like to recover the passwords from the list in order to impersonate
some of the users. discuss which of the three attacks below allow this.
exactly describe the consequences of each of the attacks:
attack a: you can break the one-way property of h.
attack b: you can find second preimages for h.
attack c: you can find collisions for h.
2. why is this technique of storing hashed passwords often extended by the use
of a so-called salt? (a salt is a random value appended to the password before
hashing. together with the hash, the value of the salt is stored in the list of hashed
passwords.) are the attacks above affected by this technique?
3. is a hash function with an output length of 80 bit sufficient for this application?

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 01:30
How will you cite information that is common knowledge in your research paper?
Answers: 1
question
Computers and Technology, 22.06.2019 15:30
In a compound condition, both conditions on either side of the logical operator and must be true for the overall condition to be true. a: true b: false
Answers: 1
question
Computers and Technology, 22.06.2019 21:00
Simon says is a memory game where "simon" outputs a sequence of 10 characters (r, g, b, y) and the user must repeat the sequence. create a for loop that compares the two strings starting from index 0. for each match, add one point to userscore. upon a mismatch, exit the loop using a break statement. assume simonpattern and userpattern are always the same length. ex: the following patterns yield a userscore of 4: simonpattern: rrgbryybgy userpattern: rrgbbrybgy
Answers: 2
question
Computers and Technology, 23.06.2019 11:00
How should you specify box sizes on a web page if you want the boxes to vary according to the font size of the text they contain? a. in pixels b. in inches c. as percentages d. in em units
Answers: 2
You know the right answer?
One of the earlier applications of cryptographic hash functions was the storage
of passwords f...
Questions
question
Computers and Technology, 09.11.2020 19:20
question
History, 09.11.2020 19:20
question
History, 09.11.2020 19:20
question
Mathematics, 09.11.2020 19:20
question
English, 09.11.2020 19:20
Questions on the website: 13722367