Break the hash function by pointing out how it is possible


In this problem, we will examine why techniques that work nicely for error correction codes are not suited as cryptographic hash functions. We look at a hash function that computes an 8-bit hash value by applying the following equation:

2076_9ef340b3-2832-4966-9a8e-277e4e64c818.png

Every block of 8 bits constitutes an ASCII-encoded character.

1. Encode the string CRYPTO to its binary or hexadecimal representation.

2. Calculate the (6-bit long) hash value of the character string using the previously defined equation.

3. "Break" the hash function by pointing out how it is possible to find (meaningful) character strings which result in the same hash value. Provide an appropriate example.

4. Which cruical property of hash functions is missing in this case?

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Break the hash function by pointing out how it is possible
Reference No:- TGS01731843

Expected delivery within 24 Hours