Lecture 8
Contents
Hashes
- Preimage attacks - given h(M), find M
- 2nd preimage attack - given M, find M’ where h(M) = h(M’)
- Collision resistant - find two messages M and M’ where h(M) = h(M’)
Uses of Hashes
- Fingerprinting
- Passwords
- Proof of Work
- Commitment
- MAC
Avalanche Property
A small change causes about 50% of the bits