Computing hash value for message

Assignment Help Data Structure & Algorithms
Reference no: EM1345799

Q1) Bob believes that he has come up with nifty hash function. He assigns a numeric value VChar to each letter in the alphabet equal to the letter's position in the alphabet, i.e., VA = 1, VB = 2, ..., VZ = 26. For a message, he calculates the hash value H = (VChar 1 x VChar 2 x VChar 3 ...x VChar N) mod(26). Bob uses this function to send a one-word message, SMALL, to his banker Bill, along with his computed hash value for the message. Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

Reference no: EM1345799

Questions Cloud

Explain the effect of appropriate business communication : Show the effect of appropriate business communication - Do you agree or disagree with the given statement
Management outlining and validating the factors : Emerging markets pose many challenges from operational and financial risks; yet emerging markets often reveal possibilities for diversification & economic growth.
Explain how does the market system efficiently perform : Explain how does the market system efficiently perform the functions of communication, coordination and motivation in the distribution of resouces to comsumers.
Describe why social media is important to the firm : Describe why social media is important to the firm and clarify the social media's goals and provide details about how to handle common situations such as negative complaints or scandals.
Computing hash value for message : For a message, he computes the hash value H = (VChar 1 x VChar 2 x VChar 3 ...x VChar N) mod(26).
Create an appropriate portfolio : You are the financial adviser to 3 individuals, a young person with high risk tolerance, a middle-aged person with medium risk tolerance and an old person with low risk tolerance.
What will be the monopoly price : suppose that the other firm holds its rate of output constant, solve for the optimal output of each firm. What is the total profits of the two firms.
Explain how increasing scrutiny and demand : Explain how increasing scrutiny and demand for accountability by the public has influenced reporting for not-for-profit and governmental entities
Find out the stopping distance for a skier : As part of a safety investigation, two 1900 cars traveling at 25 are crashed into different barriers. Find out the average forces exerted on (a) car that hits a line of water barrels and takes 1.8 to stop, and (b) car that hits a concrete barrier an..

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Explaining diffie-hellman public-key algorithm

Use the Diffie-Hellman public-key algorithm to exchange secret keys.

  Js code to prompt the user for integer and print result

Write JS code which prompt the user for an integer and prints the result.

  Write the selection sort algorithm

Write the selection sort algorithm

  Discuss new security features in windows server

Which of the system changeover methods is the most expensive? Why? Which of the system changeover methods is the most risky? Why?

  Currency conversion development

Currency Conversion Development

  Addition and subtraction of numbers in binary

Addition and Subtraction of numbers in binary and round to the nearest decimal number with three significant decimal digits

  Explaining effective customer relationships and loyalty

Paws'n Tails is an online pet shop that wants to influence what customers buy and builkd effective customer relationships and loyalty.

  Computing time complexity of procedure

What is the time complexity of the procedure? If A[l .. r] = [24, 30, 09, 46, 15, 19, 29, 86,78], what is the output?

  Users and it organizations arm against phishing attacks

How users and IT organizations must arm themselves against these attacks?

  Transmitting image using raster scan order

If we were to transmit this image using raster scan order, after 15 seconds how many rows of the image will the user have received?

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  Different applications of data structure

What are the different applications of Data Structure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd