Crypto Academy Season 3|| Week 2 Homework || Hash and Cryptography|| by @hydra1

in SteemitCryptoAcademy3 years ago

pelon.jpg

line.jpg

Explain what does the resistance to collision mean? And what does resistance to preimage mean?

line.jpg

In the world of blockchain technology, hashes play an important role and should not be undermined and one can say hashes are fundamental building blocks of the blockchain technology.
Resistance to Collision and Resistance to Preimage can not be properly comprehended without knowing what hashes are.
A hash is a mathematical algorithm that transforms an inputted data with respect to its length into a fixed output encrypted length. Hashes boast of their secured nature in the sense that it is highly impossible to reverse their computation or crack them.
We can go ahead and define what Resistance to Collision and Resistance to Preimage is.
Resistance To Collision is considered to be a property of hash function, to be able to appreciate what it means, let's know what Collision means.
Collision simply refers to the process by which two inputted data generate or produce the same results or output. Now one can say that, Resistance To Collision is a property of the hash function, where two different input data should not generate or produce output. We can mathematically express it as X and Y, where they are two distinct variables, X≠Y, But H(X)=H(Y). where H(X) is the hash of X and H(Y) is the hash of Y.
Resistance To Preimage: When it is computationally impossible or infeasible to find the input to any defined cryptographic hash output, this is referred to as resistance to preimage. Finding the input that corresponds to a hash output is impossible with resistance to preimage.
line.jpg

Use tronscan and etherscan to verify the hash of the last block and the hash of that transaction. Screenshot is required for checking.

line.jpg

Using Etherscan

Eth_1.png

  • Click on the first Latest Block where you will be able to see the block height 12775465 and the block hash
    0x6f125c38dc6f1156883f79288f54b73c4fa7015621640689ef63facbe661747f

Eth_2.png

hash.png
the hash

  • To view the first transaction, click on the first transaction.

  • In the transaction details, you will the transaction hash 0xb4dbe9943f600320175103e61fd7f1281a1169dfeccb21e50460ea506fb461b5 and the block number 12775465

TRansaction_1.png

  • To confirm this, copy the transaction hash and search for it. If it appears as the same then it is confirmed.

Transaction search.pngtransaction hash search

transaction results.png
after searching for the transaction hash

Using TronScan

  • visit https://tronscan.org/
  • From there, you will be able to see the latest block and latest transactions.

tronscan_1.png

  • click on the first block to view the details, you will see the height to be 31708478 and the Block Hash to be 0000000001e3d53e354156a14bb25b1f07b0cf3e369bb881062e64b07e6dee8e

tronscan_block.png
block hash

  • To view the block transaction click on the first transaction, from there you can view the transaction details, where the hash is 6bcde722172652c364e44babb41abf093f065f4818cdedfdf1949dbd81ac9516 and the with the block height 31708479

tronscan_transaction.png

  • To confirm this, copy the transaction hash 6bcde722172652c364e44babb41abf093f065f4818cdedfdf1949dbd81ac9516 and search for it. If it matches, then its confirmed

tronscan_search.png
transaction hash search

tronscan_confirm.png
transaction confirmation after searching

line.jpg

Generate the hash using SHA-256 , from the word CryptoAcademy and from cryptoacademy. Screenshot required. Do you see any difference between the two words? Explain.

line.jpg

To Generate Hash using https://passwordsgenerator.net/sha256-hash-generator/ follow these simple steps.
CrptoAcademy

sha256_CryptoAcademy.png

Our generated hash keys= D03CA34B258E6E0FD06B2070DDE61B50BD4EEF6161A8EDAA4A420C9AE1BEB7F9
cryptoacademy

sha256cryptoacademy.png

  • Our generated hash = 0592F5DD27DC72E675B2AB9C77487A69FAAF84196597FA052EC099C18EE7C4C5

OBSERVATION

In respect to the CryptoAcademy it generates the hashes D03CA34B258E6E0FD06B2070DDE61B50BD4EEF6161A8EDAA4A420C9AE1BEB7F9 and cryptoacademy 0592F5DD27DC72E675B2AB9C77487A69FAAF84196597FA052EC099C18EE7C4C5 there is a clear difference between the two. In the word CryptoAcademy there are two capital words C & A so it generates a different hash. To say that it is case sensitive. As we all can see in the word cryptoacademy they are all in smaller cases, so therefore it generates a different hash to mean that it is case sensitive. This is a clear interpretation of Resistance to collision. same words with different cases with the same meaning are generating different output.

line.jpg

In your own words explain the difference between hash and cryptography.

line.jpg

HASHES

As already stated, hashes are, they are mathematical algorithms that convert inputted data with respect to its length into fixed encrypted output. It generates an alphanumeric code by encoding data into a unique code with characters of 64 and prevents the repetition of such characters. Hashes over the years have evolved with MD2 being the first of the generation to SHA-256 being the latest.
Characteristics of hashes

  • Irreversible
  • They are secured
  • They are Unique

Uses of Hashes

Addresses: Wallets addresses of blockchain are always unique from each other and how it was achieved was due to the hash functions where generation of both private and public keys is done.
Mining: Mining can not be left out as one of the uses of hashes, as we all know that in mining, much computational work is needed to be able to generate blocks and hashing tends to solve that problem, thereby making it easy.
Smart Contracts: For versatility to be achieved in smart contracts, hashes are used to store sensitive information in the blockchain. Examples of such smart contracts include Ethereum, TRON, Bitcoin and many more.

CRYPTOGRAPHY

Cryptography technology is used to secure user data while also enabling anonymity. As the world of crypto is all about secret, cryptography can not be left out in its operation. The basic purpose of cryptography is to ensure the security of transactions.
Types of Cryptography

Symmetric Cryptography: Symmetric cryptography is used to ensure that no unauthorized third party has access to the data.

Asymmetric Cryptography:Asymmetric cryptography makes use of two kinds of keys. The keys are public and private. Private keys should be kept secret and should not be shared with anyone, but with public keys can be shared so as to receive assets as they tend to be the receiving addresses of assets.

Hybrid Cryptography: It is a combination of Symmetric cryptography and Asymmetric cryptography to acquire speed and accuracy of encryption and decryption.

DIFFERENCES BETWEEN CRYPTOGRAPHY AND HASHES

CryptographyHashing
Keys are required in cryptography in the
Decryption process
They Do not require keys
Its primary purpose is to transfer data in a secure and timely manner
While maintaining its user friendly interface
Its primary Goal and method of operation is to
validate the input data and secure it with their codes
The primary goal is to conceal the meaning behind dataIt entails converting data into a fixed value in
order to reflect original data
Encryption and Decryption are its main processesIt is one way process that merely converts data to codes

line.jpg

CONCLUSION

line.jpg
To conclude, hashes and cryptography are essential in the world of blockchain and should be strengthened more for maximum security. And I would like to say this lecture has been one of the best as the concepts were straight forward with simple understanding.

Thank you
Cc:
@pelon53

Sort:  
 3 years ago (edited)
Gracias por participar en Steemit Crypto Academy Season 3: Espero seguir leyendo tus publicaciones.
NoPreguntas.Puntaje.
1Explique ¿Qué significa la resistencia a la colisión? Y ¿Qué significa resistencia a la preimagen?1.5
2Use tronscan y etherscan para verificar el hash del último bloque y el hash de esa transacción. Se requiere capture de pantalla para su comprobación.3.0
3Genere el hash usando SHA-256, de la palabra CryptoAcademy y de cryptoacademy. Se requiere capture de pantalla. ¿Observa alguna diferencia entre ambas palabras? Explique.3.0
4En sus propias palabras explique la diferencia entre el hash y la criptografía.2.0

es imposible con resistencia a la preimagen.

👆Es difícil, pero los atacantes pueden lograr su objetivo.

Muy buen trabajo, felicitaciones. Continué así.

Recomendaciones:

Justificar el texto.

Calificación: 9.5

 3 years ago 

Grçias

Coin Marketplace

STEEM 0.20
TRX 0.13
JST 0.030
BTC 65133.17
ETH 3480.37
USDT 1.00
SBD 2.52