Crypto Academy / Season 3 / Week 2 - Homework Post for professor @pelon53

in hive-108451 •  4 years ago  (edited)

QUESTION 1
Explain what does the resistance to collision mean? And what does resistance to preimage mean

Resistance to Collision and Preimage

A) Resistance to Collision

InShot_20210710_212028722.jpg Image Source

This is actually a property to in the cryptographic hash function. When a hash function is said to be collision resistance, it means collision resistance is a one way hash function

Let me use H to represent hash, and two inputs x and y
When it is difficult to find two inputs that are hash to the same output,
With the two inputs not equal to each other,
That is x not equal to y
But H(x)=H(y)
Then we term it a resistance to collision.

Normally, cryptographic hash functions are made to be coalition resistance. But some have however been broken.

B) Resistance to Preimage

InShot_20210710_212054889.jpg Image Source

The resistance to pre-image talks about the invert-ability of the hash function. It is actually a property that causes difficulty to invert.
With the pre-image reistance, an element in a range should be computational infeasible to find the input map to the element.

The preimage is used to input and output domains of similar sizes for the fact that it corresponds to one-wayness.
For a hash function to be preimage, it must have a minimum length of 90 bits

The preimage is particularly important because it cause the output to repeat it self. Although when an attacker is able to value in the preimage, he wins solely because the attacker is always ask make the selected hash work.




QUESTION 2
Use tronscan and etherscan to verify the hash of the last block and the hash of that transaction. Screenshot is required for checking

Using Tronscan and Etherscan to verify Hashes

1) Using Tronscan

This is achieved in the following steps.

Step 1, visit the tronscan.com website

InShot_20210710_212134832.jpg

Step 2: click on blocks

InShot_20210710_212229523.jpg

Step 3: We can see the block and transaction, hashes

InShot_20210710_212416027.jpg

InShot_20210710_212455728.jpg
Hash: 0xf50ef6c52e3d8c23f14cb66f3b8579e07f0356e3248be952853257bd3f0a2c44

InShot_20210710_212318266.jpg
Hash: 695c2b0e020d8656139586733a6ed54534dcc3a3fab681211867922ae9bc8f0b

2) Using Etherscan

This can be achieved in the following steps

Step 1, visit the etherscan.com website

InShot_20210710_212525489.jpg

Step 2: We click on transaction

InShot_20210710_212645950.jpg

InShot_20210710_212711198.jpg
Hash: 0000000001e5973a56b4e0584c7a598da6bd66a5755916e57d5aed8e8cbec042

Step 3: we now click on blocks,to view the block hash

InShot_20210710_212903848.jpg

InShot_20210710_212822523.jpg
Hash: 0x62a6205a469dc8e4ba72151e13776b0ff4bd5d91ed3e91b15980361630a162ab




QUESTION 3
Generate the hash using SHA-256 from the word cryptoacademy and from cryptoacademy. Screenshot required. Do you see any difference between the two words? Explain

Generating hash using SHA-256

We follow the following steps

Step 1, visit the SHA-256 website

InShot_20210710_212939047.jpg

Step 2: We type the word: CryptoAcademy and click generate

InShot_20210710_213044607.jpg

Step 3: We type the word cryptoacademy and click generate.

InShot_20210710_213109089.jpg

Differences

The two words though the same, just differs in capitalisation produces two different hashes.
This shows that a hash is very unique as well as uppercase and lower case sensitive.




QUESTION 4
In your own word explain the difference between hash and cryptography

Difference between hash and cryptography

I will list out the various difference between hash and cryptography in the points below.

  • in the cryptography, it is dependent on how users secure it keys for its security, whereas in the hash, is more secure because of its one-way nature.
  • hashing is irreversible which makes it impossible for the generation of input from the hash value. Whereas in the cryptography input is generated from ciphertext using private key.
  • hashing normally has a fixed value of length, while the cryptography the data length is limitless
  • no exchange of keys is required in the hash. While in cryptography, it requires two users to access key for decryption.

CONCLUSION

We can actually use the hashing and cryptography to securely protect our date for transmission.
With this and from above, we have seen that the hash is preferred more because of its irreversible feature which is great for password safety.
We can also visit the tronscan and etherscan to view the various hashes of the blocks and transactions.

CC: @pelon53
#pelon53-s3week2

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Gracias por participar en Steemit Crypto Academy Season 3:

Espero seguir leyendo tus publicaciones.

NoPreguntas.Puntaje.
1Explique ¿Qué significa la resistencia a la colisión? Y ¿Qué significa resistencia a la preimagen?1.5
2Use tronscan y etherscan para verificar el hash del último bloque y el hash de esa transacción. Se requiere capture de pantalla para su comprobación.1.8
3Genere el hash usando SHA-256, de la palabra CryptoAcademy y de cryptoacademy. Se requiere capture de pantalla. ¿Observa alguna diferencia entre ambas palabras? Explique.2.5
4En sus propias palabras explique la diferencia entre el hash y la criptografía.2.0
  • Explicar de forma sencilla y clara cada concepto solicitado.

  • No pude hacer seguimiento al hash del bloque y de la transacción.

Recomendaciones:

  • Es necesario justificar el texto.

  • Cuando los datos solicitados no se pueden observar, debes copiar y pegar en un sitio visible.

  • En las captures de pantalla debes señalizar los datos solicitados, como el bloque a estudiar, el hash encontrado. Puede ser con flechas, recuadro u otro sistema.

Calificación: 7.8