Crypto Academy Season 3|| Week 2 Homework || Hash and Cryptography|| by @roma078

in hive-108451 •  4 years ago  (edited)

INTRODUCTION


Hash is generates an output. A hush is a mathematical algorithm which transforms data into a fixed output. Hashing can be used for so different reasons.

Hashing can be used to compare to files without even opening to check the files word for word. It tells if the two documents are different from each other or the same.

Hashing can also be used to compare the quality of a file When transferred from one place to another. To confirm the transferred file is not corrupted or damaged. To ensure a quilty file we compare the hush values of both files, if they are the some we then know its an identical copy.

Characteristics of Hashes

  • They are secured
  • They are Irreversible
  • They are unique

Hushes are secured such that you cant reverse its computation.


Question 1


Resistance To Collision
Resistance to collision is a property of hush function. Before we undertaker what resistance to collision means lets get to understand what collision is. Collision refers to when two data is inputted to generate the same output. Now Resistance to collision refers to when two input doesn't generate one output or the same code.

Lets mathematically represent X and Y as different two variables which means X is not equal to Y. But then hush X and hush Y are equal.

Resistance to Preimage

Preimage resistance is the property of a hash function which is hard to reverse. It is computational impossible to find an input in a range which matches the element of a hash output. It avoids or prevents attacks on the hash code.


Question 2


Using Etherscan

blocks and trans.PNG

  • Lets click on the first latest block to view the block height and block hash which are 12802071
    and
    0xf47f2e59bb6104c150d5f15cd0418b604df140d05163ce4f1496f400344b13bd respectively.

detail 1.PNG

detail 2.PNG

  • Lets click on the first transaction to view its details
  • We will find the transaction hash and its number which are 0xbc16d7e2105c11b910c61e9fb2e5c7d5556e34ec2be4fa354fa5fe416222879d and 12802071 respectively

transaction details.PNG

  • Lets copy the transaction hash and search to confirm. Its confirmed if it appears the same. We can see its the same

confirm.PNG

Using TronScan

  • Navigate to https://tronscan.org/

  • We will see the latest block and transactions
    b and t.PNG

  • We click on the first block to view the details which we can see in the screenshot
    block details.PNG

  • We click on the first transaction to view the details which we can see in the screenshot
    trans details.PNG

  • Lets confirm by searching with the transaction hash. If the code matches then its confirmed
    confirm.PNG


Question 3


generate.PNG

  • We have gotten our hush key which is D03CA34B258E6E0FD06B2070DDE61B50BD4EEF6161A8EDAA4A420C9AE1BEB7F9
    generate.PNG
  • lets also generate hush key for cryptoacademy by visiting the same site
    other.PNG

  • our hush key is 0592F5DD27DC72E675B2AB9C77487A69FAAF84196597FA052EC099C18EE7C4C5

OBSERVATION
We input CryptoAcademy and got generated hash key D03CA34B258E6E0FD06B2070DDE61B50BD4EEF6161A8EDAA4A420C9AE1BEB7F9 and also cryptoacademy and had our hash key 0592F5DD27DC72E675B2AB9C77487A69FAAF84196597FA052EC099C18EE7C4C5. Looking at the two hash kkeys we can see they are both diffrent from each other. This is because the words CryptoAcademy and cryptoacademy are both diffrent. CryptoAcademy has two capital letters and cryptoacademy are all small letters. This experiment is to indicate that it is case sensitive and hence it generates different hash keys

Question 4

Both Cytography and Hashing are related to each other and below here i will make some few difference between them.

CryptographyHashing
It hides its meanings behind dataconverts data to a fixed value
Keys are requiredHashes does not require any keys
does not have a set length of code.has a fixed number of characters
its main work is to encypt and decryptIt converts data to codes
It encrpt and decypt data and make sense of itIt is generated by entering data into SHA-256 input box
Cytography can store information of a very big dataHashes have 64 character long

CONCLUSION

I really enjoyed the class. i was able to learn some new stuffs from this week lecture. I did my best to work on every aspect of the assignment and im looking forward to participate in your subsequent lectures of yours.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Gracias por participar en Steemit Crypto Academy Season 3:

Espero seguir leyendo tus publicaciones.

NoPreguntas.Puntaje.
1Explique ¿Qué significa la resistencia a la colisión? Y ¿Qué significa resistencia a la preimagen?1.7
2Use tronscan y etherscan para verificar el hash del último bloque y el hash de esa transacción. Se requiere capture de pantalla para su comprobación.2.0
3Genere el hash usando SHA-256, de la palabra CryptoAcademy y de cryptoacademy. Se requiere capture de pantalla. ¿Observa alguna diferencia entre ambas palabras? Explique.2.3
4En sus propias palabras explique la diferencia entre el hash y la criptografía.2.0
  • Pregunta 1, mejorar cada concepto.

  • Pregunta 2, no pude observar los hash generados en tronscan.

  • El experimento de la pregunta 3, es para que observen la resistencia a la colisión.

Recomendaciones:

  • Explicar de una forma sencilla y clara.

  • Cuando los datos solicitados no se observen, debes copiar y pegarlo en un sitio visible para ser chequeados.

Calificación: 8.0