In the previous chapter, we discussed the idea behind a forward search attack on a public key cryptosystems. In certain applications, a forward search attack can be used against a hash function.
a. What is a forward search attack on public key encryption, and how is it prevented?
b. Describe one plausible use for a hash function where a forward search attack is feasible.
c. How can you prevent a forward search attack on a hash function?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here