Explaining weak collision property of a hash function


1) Write down the functions that are used to produce the authenticator?

2) Determine the block size of MD5 and how many bits are produced as the message digest?

3) What do you understand by hash function?

4) Write down the difference between MAC and Hash function.

5) Write down any three hash algorithm. Explain them with suitable example.

6) Explain the requirements of the hash function in detail with suitable example.

7) What is the function of compression function in hash function?

8) Write down the difference between direct and arbitrated digital signature?

9) What do you mean by Birthday attack? Explain it with suitable example.

10) What do you mean by weak collision property of a hash function?

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Explaining weak collision property of a hash function
Reference No:- TGS010545

Expected delivery within 24 Hours