Crypto Academy / Season 3 / Week 2 - Homework Post for @pelon53 (Hash and Cryptography)

in hive-108451 •  4 years ago  (edited)

Hello all.....

Today I will try to join professor @pelon53 class on hash and cryptography. This is a very interesting class. ok i will try to solve some questions from homework this week.

zaki - Copy (3).jpg
Background from Canva

Explain what does the resistance to collision mean? And what does resistance to preimage mean?

Resistance to Collision

Resistance to Collision is a hash function that anticipates a collision against 2 different inputs leading to the same output. so the hash function will anticipate the occurrence of the same output from 2 different inputs. Resistance to Collision plays an important role in the security level of the hash.

although the length of the input characters is different, the output has the same hash length in the form of an alphanumeric code that is given randomly, making it difficult for hackers to find out which input has been processed. With the Resistance to Collision function, it is almost impossible for a collision between inputs to occur. because if the inputs have the same hash then this can cause data loss as well as hacking can occur.

Resistance to Preimage

Resistance to Preimage is one of the hash functions that can be said to make it difficult for hackers to find input from output (hash). so if you have done the input and output has been generated in the form of a hash. then it is quite difficult to decode the hash to find the previous input, and arguably almost impossible. There are two types of resistance to preimage, namely Preimage resistance and Second preimage resistance.

  • Preimage resistance

preimage resistance has a function to protect user data from hackers by making it difficult for hackers to find input from a very unique hash code.

  • Second preimage resistance

Second preimage resistance has the function of anticipating hackers who find two different inputs when colliding into the same output, this is all if a collision is possible.

Use tronscan and etherscan to verify the hash of the last block and the hash of that transaction. Screenshot is required for checking

Tronscan

1.jpg

  • after that select last block to view the information.

2.jpg

  • after that you can find detailed block information, such as :
    Block height : 31746966
    Block hash : 0000000001e46b968262a7fcdb1e01cfa3ca1da2862e9cab0f5f6d52d793c6c2

3.jpg

  • To view transaction information, return to the main page and select the last transaction.

4.jpg

  • on that page you can see detailed transaction information. as :
    Hash : 03c5c75e5fde44eca0d93f0e281a99bb709d63aa064de724ae2a792bbdb4c1ab

5.jpg

Etherscan

1.jpg

  • after that select last block to view the information.

2.jpg

  • after that you can find detailed block information, such as :
    Block height : 12784189

3.jpg

  • Then scroll down to see hash information:
    Hash : 0x50644bb9628eb5ca89d35a1cc64bb500f8a5932233c366dbf93d5a86fabdb955

4.jpg

  • To view transaction information, return to the main page and select the last transaction.

5.jpg

  • on that page you can see detailed transaction information. as :
    Transaction Hash : 0x552cd4735c936e3a91e2fb39c08ddcaa169d9662bd5d8825a42d93162a31fc63

6.jpg

Generate the hash using SHA-256, from the word CryptoAcademy and from cryptoacademy. Screenshot required. Do you see any difference between the two words? Explain

Screenshot_1.jpg

  • then try to enter "cryptoacademy". it will generate Hash : 0592F5DD27DC72E675B2AB9C77487A69FAAF84196597FA052EC099C18EE7C4C5

Screenshot_2.jpg

from the above experiment we can conclude that the hash has a different output from each different input even though only the capital letters are different. from the example above I gave the first input, namely "CryptoAcademy" with the letters "C" and "A" contained in the word capitalized. and the second input is "cryptoacademy", although with the same word but produces a different hash due to changes in capital letters. these have all proved that the hash is immutable and remains the same length. so it can be said to have a very good level of security.

Explain the difference between hash and cryptography

Security-Finaljpg.png
source

hash is an algorithm code that functions for security on the blockchain, with the code provided is quite unique and has a different hash for each input so that it can be said that the hash provides a good level of security and cannot be hacked easily. hash also has the same length even though the length of the input given is different. because the hash system is a unique code so that hackers cannot guess or predict the input from the hash.

Cryptography is a method to provide security to users related to user privacy such as passwords, information and other user data. Cryptography runs on a blockchain network to provide security and convenience for its users. with the cryptographic function can maintain the blockchain network rather than hacker activities, so with the cryptographic function, only the user and the intended party can know the information.

Here are the differences between hash and cryptography which I have summarized in the table below.

NoHashCryptography
1Hash requires no passwordCryptography requires password
2Hashes are the same lengthCryptography has varying lengths of data
3The hash is immutableSecret information on the blockchain network
4unable to predict input from hashvery difficult to find information related to user privacy
5providing security by processing input data into hashproviding security when sending data to the intended user

Conclusion

Hash and cryptography have the same goal of increasing security on blockchain networks. hash is a unique form of code generated from the inputted information, so that by converting the input information into a hash it can secure the information from hackers. while cryptography protects all information on the blockchain so that the users and the intended users know it. with hash and cryptography can provide security and convenience to users who use blockchain.


Thank you for reading my writing, hopefully it can be useful and easy to understand

CC: @pelon53

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  
  ·  4 years ago (edited)

Gracias por participar en Steemit Crypto Academy Season 3:

Espero seguir leyendo tus publicaciones.

NoPreguntas.Puntaje.
1Explique ¿Qué significa la resistencia a la colisión? Y ¿Qué significa resistencia a la preimagen?2.0
2Use tronscan y etherscan para verificar el hash del último bloque y el hash de esa transacción. Se requiere capture de pantalla para su comprobación.2.5
3Genere el hash usando SHA-256, de la palabra CryptoAcademy y de cryptoacademy. Se requiere capture de pantalla. ¿Observa alguna diferencia entre ambas palabras? Explique.2.5
4En sus propias palabras explique la diferencia entre el hash y la criptografía.1.8

No pude corroborar que el bloque sea el mismo tanto para su propio hash, como para el de la transacción. Las captures no me lo permitieron por estar borrosas.

Buen trabajo, continúe mejorando.

Recomendaciones:


Cuando las captures de pantalla no se vean bien trate de mostrar los datos relevantes, para poder verificar su tarea.

Calificación: 8.8

Thanks professor @pelon53 for the advice, it looks like you have wrongly added the total value that should be 8.8

Saludos, gracias tienes razón. Ya hice la corrección.