Crypto Academy Season 3 (Week 2) - Homework Post for @pelon53 [Hash and Cryptography]

in SteemitCryptoAcademy3 years ago (edited)

On this occasion I will try to answer questions from the homework given by professor @pelon53, as for this week's class related to Hash and cryptography, well I will try to answer some of the questions given in this week's homework.

1. Explain what does the resistance to collision mean? And what does resistance to preimage mean?

hashing-algorithms.webpsource

Hash is a unique algorithm code that is generated by an information inputted into the system. The code is also very unique and has the same length even though the inputted information has a different length. With a system like this, the hash cannot be guessed or predicted to get the previous input information. this is all very efficient for the security of the blockchain network from hackers.

Resistance to Collision

Resistance to Collision is a function of Hash to anticipate collisions, so that the output (Hash) will not be the same from each different input, the output (hash) also has the same length even though the input given has a different length. this is why it is said that Hash is very unique.

With Resistance to Collision, the chance of similarity between outputs is very small. but if in a long time it is not impossible because the input is unlimited while the hash algorithm has limitations. so if the inputs given produce the same hash then the chance of hacking is very large. This is where the Resistance to Collision function is to anticipate the occurrence of Hash similarities to the input information.

Resistance to Preimage

Resistance to Preimage is a Hash function that protects the input information from a very unique output (Hash). because it is quite difficult for hackers to be able to understand or crack the hash to get the inputted information. This is all because the hash algorithm is very difficult to guess or solve.

if we look at the hash algorithm, it is certainly very difficult to find what information is inputted. hash can be said to have provided a very unique algorithm that makes it difficult for hackers to find the information, this is all for the security of the information entered by the user.

Resistance to Second Preimage

Resistance to Second Preimage is a Hash function that can anticipate crime to find out the inputted information, if the input is different but a collision occurs so that it produces the same output (hash).

for now the hash function is very effective for the security of information entered by the user. so the possibility of being hacked is very small, so Hash attaches great importance to the security of the hash algorithm which is unique and very difficult to crack.

2. Use tronscan and etherscan to verify the hash of the last block and the hash of that transaction. Screenshot is required for checking

Tronscan

  • Visit the tronscan website; https://tronscan.org/#/. there you can see several options to get the information contained in the tronscan such as Blocks and Transactions

1.jpg

  • Then select the last block to view block information.

2.jpg

  • There you will get information about the block. Block Height : 31759282, and Block Hash : 0000000001e49bb2f8702b2d1f3b784599bc02d63fa5a0b04d7e565f7d2f8f17

3.jpg

  • Then return to the main page to select the last transaction

4.jpg

  • After that you can see the latest information. Hash : 1f05d08daa90fd6e4c0ec47ba2efd1f2e5055b4759c227c2690f30e0de6f9f95

5.jpg

Etherscan

  • Visit the official website of Etherscan ; https://etherscan.io/. there you can see several options to get the information contained in etherscan such as Latest Blocks and Latest Transaction

1.jpg

  • Then open Latest Blocks.

2.jpg

  • then you will get block information. Block Height : 12787160

3.jpg

  • Then scroll down click to see more, and Hash : 0x291a7c19d6fbcd34c49aa57cdd22c472617ebd038b8ac77c4b936fe01d4cfff0

4.jpg

  • Then return to the beginning to be able to select the last transaction

5.jpg

  • Then you will get the last transaction details. Transaction Hash: 0xa6151622a7dc8967d6bd4c4952ba42c39126dbbaa9ab4437bfafba959a380d1a

6.jpg

3. Generate the hash using SHA-256, from the word CryptoAcademy and from cryptoacademy. Screenshot required. Do you see any difference between the two words? Explain

  • The first step is to find the hashes of the words "CryptoAcademy" and "cryptoacademy" using SHA-256. visit the web address https://passwordsgenerator.net/sha256-hash-generator/.

  • First let's try to enter "CryptoAcademy". it will generate Hash: D03CA34B258E6E0FD06B2070DDE61B50BD4EEF6161A8EDAA4A420C9AE1BEB7F9

2.jpg

  • Second, let's try entering "cryptoacademy". it will generate Hash: 0592F5DD27DC72E675B2AB9C77487A69FAAF84196597FA052EC099C18EE7C4C5

1.jpg

From the example above, we can see that with two experiments, although filling in the same word but having differences such as capital letters used, it will produce different hashes. on the first try I entered the word "CryptoAcademy" using capital letters "C" and "A" while on the second try I entered the word "cryptoacademy" by not using capital letters so we can see that the generated hash is different, so we can conclude that the hash won't be the same from different inputs even if it's just a small change like a capital letter.

4. Explain the difference between hash and cryptography

encryption-encoding-hashing.jpgsource

As for some of the differences between Hash and cryptography, I'll try to break it down.

Hash

  • Hash is able to make information into a unique algorithm so that it cannot find the input information from the output (Hash).

  • Hash does not require a password.

  • Hash protects an information that is inputted through the output resulting in a unique algorithm that cannot be cracked.

  • Hash have the same length of an algorithm

  • Hash cannot be repeated or changed.

  • Hash a good level of security because the hash rarely has the same output from different inputs so it is very difficult to hack.

Cryptography

  • cryptography is able to perform the encryption and decryption process

  • Cryptography requires a password

  • Information is very confidential so it cannot be known by foreigners who are not involved in the transaction process

  • Cryptography has a very variable length of data.

  • Cryptography can be repeated to find the initial input.

  • Cryptography has a good level of security because it prioritizes user privacy in terms of maintaining various user information when making transactions.

Although from a functional point of view, hash and cryptography have some differences, hash and cryptography both play a very important role in maintaining the security of the blockchain system.

Conclusion

Hash and cryptography provide a level of security for users who are on the blockchain network. with hashes and cryptography, user security is guaranteed. this is all very much related to the security of user privacy so that it can anticipate user data from crimes such as hacking. so that it can provide user convenience when carrying out activities on the blockchain network.

thanks to professor @pelon53 for giving a very good lecture this week. Hopefully my understanding and other readers about crypto will increase even more. That is all from me.

Thanks.......

Sort:  

Gracias por participar en Steemit Crypto Academy Season 3:

Espero seguir leyendo tus publicaciones.

NoPreguntas.Puntaje.
1Explique ¿Qué significa la resistencia a la colisión? Y ¿Qué significa resistencia a la preimagen?2.0
2Use tronscan y etherscan para verificar el hash del último bloque y el hash de esa transacción. Se requiere capture de pantalla para su comprobación.2.0
3Genere el hash usando SHA-256, de la palabra CryptoAcademy y de cryptoacademy. Se requiere capture de pantalla. ¿Observa alguna diferencia entre ambas palabras? Explique.2.8
4En sus propias palabras explique la diferencia entre el hash y la criptografía.2.0

En la pregunta 2 no coincide el bloque con el hash de ese bloque y la transacción de ese mismo bloque, en tronscan. 31759282 y 31759344.

Buen trabajo, espero seguir viendo mejorías en tus tareas.

Recomendaciones:

  • Leer con detenimiento cada pregunta y dar la respuesta acertada de acuerdo a lo solicitado.

Calificación: 8.8

Coin Marketplace

STEEM 0.28
TRX 0.11
JST 0.030
BTC 67689.07
ETH 3801.39
USDT 1.00
SBD 3.55