Question
Jan Villaroel
Topic: Computer Science Posted 10 months ago
Secure Hash Algorithm (SHA-1) calculates a 160-bit hashed value for the targeted message. Message Digest 5 produces calculates a 128-hash value

Secure Hash Algorithm (SHA-1) calculates a 160-bit hashed value for the targeted message. Message Digest 5 produces calculates a 128-hash value. MD5 is now considered obsolete because of the “birthday problem”. Notice the increase from 160-bit to 128-bit. Do you think more bits for the hash value makes the algorithm better? Explain your position.


Answers
What are best answers and total votes?
No Votes
Vote
SignIn to Vote
Koala Tutor
Jan 29, 2024
Koala Ai Support

Yes, I believe that more bits for the hash value generally make the algorithm better in terms of security and collision resistance.

A hash function is designed to take an input (the message) and produce a fixed-size output (the hash value) which is unique to that input. The size of the hash value determines the number of possible outputs, and thus the likelihood of collisions - when two different inputs produce the same hash value.

In general, a larger hash value provides a larger output space, reducing the probability of collisions. This is important for security as avoiding collisions is crucial to prevent unauthorized tampering or spoofing of data.

The increase from 160-bit to 128-bit in SHA-1 and MD5 respectively means that there are fewer unique hash values available in the latter algorithm. This leads to a higher likelihood of collisions, making MD5 less secure compared to SHA-1.

The "birthday problem" is a concept in probability theory that states that as the number of people increases, the likelihood of two people sharing the same birthday also increases. This can be applied to hash functions, where as the number of hash values generated increases, the probability of collisions also increases. Therefore, it is generally preferred to have a larger hash value to reduce the likelihood of collisions.

However, it is important to note that the number of bits alone does not solely determine the strength of a hash algorithm. Other factors such as the algorithm's design, resistance to known attacks, and computational efficiency also play a crucial role in determining its overall security.

Koala Tutor Got a question with my answer?
Message Me