There's nothing "
harsh" about that quote, it's actually mild and comforting
FTR, There is currently no recorded collisions for both SHA-256 and RIPEMD-160, Bitcoin is using the two famously for computing "
pubkey hash".
1.What's the effect of detecting collisions on the harsh outputs?
For the particular hash function, projects that are using it like Bitcoin would start looking for safer alternatives.
Like if SHA256 proved to become unsecured after discovering multiple collisions or successful collision attacks, developers might consider using SHA512 instead.
<
addition, because my answer didn't really answered the question: For Bitcoin address collisions (because it was created through hashing),
the two persons who own the private keys that derived the same address can spend each other's funds>
2.Is collision an advantageous cryptographic occurrence or not.?
No.
3.Are there cryptographic measures in place in order not to experience collisions in harsh outputs?
For "
pubkey hash", Bitcoin has been using two entirely different hash functions. So if one got compromised, there's another one to break.
For some "
Redeem script" and "
P2SH addresses", the same as above.
For Mining, Bitcoin uses SHA-256d (
d=double) for a reason: (
wiki: SHA-256d)
While taking a course on cryptography and block chain,
Are those questions part of your exam?
Firstly, I'm sorry for using HARSH instead of HASH, it's a typo error.
Secondly, the questions are not part of my exams but part of my efforts to seek more knowledge about what I'm learning since the course didn't treat it the way I wanted.
Thanks.
we have two hash function types, the non-cryptographic and cryptographic hash function. the former is usually used for hash-based lookups like hash tables,... one example is MurmurHash. collision is a common thing in this group and we don't care about it. the later is used for cryptography when security is needed. the output lengths are larger than 160-bit. the one bitcoin uses is SHA256. collision in this group can be considered impossible due to the huge result size that the data is being mapped to.
That's an intelligent input, thanks.
From what you mentioned "non cryptographic hash function does not care about security while cryptographic hash care more about security"
I want to know what are the applications of the former and why is security negligible ?
Is collisions not a malfunctioning of the cypropgraphic Hash function or is it what human or hackers cause in order to have access into another user's private key?
I'm not clear about what you explained.