Cryptographic hash functions find their application in the c

Cryptographic hash functions find their application in the construction of effi- cient digital signatures. Recall, a digital signature procedure prescribes that a hash value of a message is to be signed, instead of signing the message directly. Which property a hash function has to satisfy in order to be useful for the digital signature? Please explain.

Solution

h should destroy all homomorphic structures in the underlying public key cryptosystem h should be computed on the entire message h should be a one-way function so that messages are not disclosed by their signatures it should be computationally infeasible given a message and its hash value to compute another message with the same hash value should resist birthday attacks (finding any 2 messages with the same hash value, perhaps by iterating through minor permutations of 2 messages)
Cryptographic hash functions find their application in the construction of effi- cient digital signatures. Recall, a digital signature procedure prescribes that

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site