• Keine Ergebnisse gefunden

Martin Finn-Sell

N/A
N/A
Protected

Academic year: 2022

Aktie "Martin Finn-Sell"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Topics in Algebra: Cryptography - Blatt 6

11.30-12:15, Seminarraum 9, Oskar-Morgenstern-Platz 1, 2.Stock

http://www.mat.univie.ac.at/~gagt/crypto2018

Goulnara Arzhantseva

goulnara.arzhantseva@univie.ac.at

Martin Finn-Sell

martin.finn-sell@univie.ac.at

1 Test questions from the lecture to refresh:

Question 1. a) What other uses of cryptographic proofs-of-work do you know?

b) What are (dis)advantages of deploying distributed ledgers?

Question 2. What is the length (=number of intermediate hash values) of a verification path in the Merkle tree havingntransations? What is it for ak-ary tree withnleaves?

Question 3. Why in your opinion is the difficulty of the proof-of-work in bitcoin set to 10 minutes? What would go wrong if it was changed to 60 minutes or 10 seconds?

2 Exercises

Question 4. Let h be an arbitrary hash function with 256-bit output. Show that choosing 2130+1inputs uniformly at random gives a99.966% chance to have at least two inputs that collide.

Hint: use the probabilistic version of the pidgeonhole principle (see also the birthday para- dox).

Question 5. How secure is a Merkle tree? Can we forge messages, and if so what kind of forgeries can we construct?

3 Further notes on hash functions

I’ve been reading:

1. https://news.ycombinator.com/item?id=12494317 1

(2)

2. https://crypto.stackexchange.com/questions/9684/pre-image-resistant-but-not-2nd-pre-image- resistant

Take a look at the discussions there for more information. Note, they’re hyperlinked in the electronic version of this document.

2

Referenzen

ÄHNLICHE DOKUMENTE

Perspectives on integrating PS enterprises in training delivery under ATVET (Agricultural Technical and Vocational Education and Training) in Rwanda and

Comprehensive Border Security and Management – The Dialogue of the College Since 2009, the College has conducted over sixty specialized training courses and

The preceding suggests the fol- lowing answer to the question what goal incremental confirmation is sup- posed to further: Science aims at informative truth, and one should stick

What is the length (=number of intermediate hash values) of a verification path in the Merkle tree having n transations. What is it for a k-ary tree with

What is the length (=number of intermediate hash values) of a verification path in the Merkle tree having n transations? What is it for a k-ary tree with n leaves?. Question 18. Why

Rahel Brunschwiler

Nelsen and Daniels‟s (2007) definition of quality is invalid according to Routio‟s (2009) criteria as the two parts of this definition ignores the requirements of the

Ensuite, trois Points d’Échanges Internet (PEI) furent installés au Royaume-Uni, et d’autres pays européens firent de même. Avec l’arrivée de la concurrence dans