Skip to main content

All Questions

1 vote
2 answers
154 views

How can I do Gaussian elimination of a $32 \times 32$ bit matrix?

I have been looking at how to reverse the sigma operation in the sha256 hash and in several places I have seen that you have to make a $32 \times 32$ bit matrix and then solve it with Gaussian ...
jefrey's user avatar
  • 13
0 votes
1 answer
171 views

What is the purpose of the "diffusion" property of a hash function? [closed]

https://www.cs.cornell.edu/courses/cs312/2008sp/lectures/lec21.html says For a hash table to work well, we want the hash function to have two properties: Injection: for two keys k1 ≠ k2, the hash ...
Tim's user avatar
  • 47.7k
0 votes
0 answers
126 views

Is it possible to construct a hash function that accepts multiple keys and returns the same value if at least one key is the same?

How to construct a hash function that accepts multiple keys as input and returns the same value if at least one input key is the same, no matter which keys are identical? For example, the desired hash ...
Lizhi Liu's user avatar
0 votes
0 answers
181 views

Time Complexity Baby Steps Giant Steps

This has been driving me mad. On wikipedia's page on baby steps giant steps it gives the time complexity of the algorithm as $O(\sqrt n)$. It even gives looking up a value in a hash table as how you ...
guywholovesmath's user avatar
0 votes
1 answer
85 views

What system has modular inverses for non primes too?

Is there a system that has modular inverses for non prime mods? Ultimately what I am trying to do is design a hash function that given a list of n outputs (mod m) and inputs (large arbitrary integers),...
Darren Smith's user avatar
1 vote
1 answer
139 views

Domain of hash function

I am reading Buchmann's Introduction to Cryptography, 2nd ed. On page 267, $G$ is a finite cyclic group of prime order $q$. $a\in\mathbb{Z}_{q}=\mathbb{Z}/q\mathbb{Z}$. $h:\{0,1\}^{*}\to G$ is a hash ...
Delong's user avatar
  • 1,889
3 votes
1 answer
83 views

Why is $a^{-1} \cdot a \equiv 1 \text{ mod } m$ a lemma in universal hashing? [duplicate]

I have been given the following lemma in a online lecture on universal hashing: Lemma: Let m be a prime. For any $a \in \{ 1, \dots, m-1 \} $ there exists a unique inverse $a^{-1}$ such that $a^{-1} \...
DenLilleMand's user avatar
1 vote
0 answers
14 views

Is there a hash-like function from pointed digraphs where if A and B differ only in the placement of the point, this is clear in the hash?

I want a cryptographically secure hash-like function (it need not output integers, it could be any data type) which takes directed graphs with a single marked point as input, so that if graphs A and B ...
Seth Schmidt-O'Hainle's user avatar
1 vote
1 answer
58 views

Understanding hash functions.

What I understand by a Hash function, is a function $H$, such that taking an input $x$ of some bit-length $L$, produces an output $y$ of some bit-length $l$ such that $L >> l$ (where ">>" means ...
Lecter's user avatar
  • 449
0 votes
0 answers
70 views

A random oracle as a CRHF

Reading through the book Introduction to Modern Cryptography by Katz/Lindell, I'm having some trouble understanding this part. (It's on p.178 in 2e, chapter 5.5) What I'm struggling with are: How ...
Measurezero's user avatar
1 vote
1 answer
38 views

How difficult would it be to find valid answers for this hash arrangement?

If $A$ is a 160-bit number, and $X \& Y$ are two SHA-1 hashes, to be generated such that the 320-bit number $X\mathbin\|A$ hashed to $Y$, and the 320-bit number $A \mathbin\| Y$ hashed to $X$? ...
Rog's user avatar
  • 11
2 votes
3 answers
62 views

How can I increase the complexity of a number and maintain uniqueness

I have an 8-digit number and you have an 8-digit number - I want to see if our numbers are the same without either of us passing the other our actual number. Hashing the numbers is the obvious ...
SphereOverload's user avatar
0 votes
1 answer
151 views

Distinguishing cryptographic properties: hiding and collision resistance

I saw from Another question the following definitions, which clarifies somewhat: Collision-resistance: Given: $x$ and $h(x)$ Hard to find: $y$ that is distinct from $x$ and such that $h(y)=h(x)$. ...
owninggreendragsdude's user avatar
1 vote
1 answer
74 views

Given a boolen hash function (based on XOR), find the $n^{th}$ key for a specific hash.

A boolen hash function is given that takes a hexadecimal key as input and returns the hash for that key (hash can be only 0 or 1). The hash function is based on XORing bits of the key. For example, ...
Saksham Jain's user avatar
1 vote
2 answers
1k views

Why do we pick ax + b when doing universal hashing?

Why can't we pick just $x + b$ for example? I know that for universal hashing the Pr[$h(x) == h(y)$] $\leq 1/|n|$ But with the same hash function, just without the $a$ we can get $h(k) = (($k$ + b$ ...
Joe's user avatar
  • 553

15 30 50 per page