Computer Science

We say that a function T is incremental if it satisfies the following property: Having once applied T to M, the time required to update the result upon modification of M is proportional to the amount of modification done to M. Suppose we have an incremental hash function H.

a. Discuss one application where this incremental hash H would be superior to a standard (non-incremental) hash function.

Don't use plagiarized sources. Get Your Custom Essay on
Computer Science
Just from $13/Page
Order Essay

b. Suppose a message M can only be modified by appending more bits, that is, the modified message M’ is M’ = (M, X), for some X. Given a cryptographic hash function h, define an incremental cryptographic hash function H based on h.

Suppose that Sally (a server) needs access to a symmetric key for user Alice and another symmetric key for Bob and another symmetric key for Charlie. Then Sally could generate symmetric keys Ka±, KB, and Kc and store these in a database. An alternative is key diversification, where Sally generates and stores a single key Ks– Then Sally generates the key KA as needed by computing KA = /i(Alice, Ks), with keys KB and Kc generated in a similar manner. Give one significant advantage and one significant disadvantage of key diversification as compared to storing keys in a database.

Place Order
Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Try it now!

Grab A 14% Discount on This Paper

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.