Explain how the use of the secure hash of an object to identify and route messages to it ensures that it is tamper-proof. What properties are required of the hash function? How can integrity be maintained even if a substantial proportion of peer nodes are subverted?

What will be an ideal response?


• If the routing mechanism is secure, then objects will only be contactable at an address that is derived from the secure hash.

• More importantly, even if the routing mechanism and some peer nodes are compromised, a client can request the content of the object and check its validity by computing the secure hash and comparing it with the GUID.

• The secure hash must be a one-way function for which it is computationally infeasible to generate two objects that hash to the same result. Else an attacker could store one value and then replace it with the other at a later date.

Computer Science & Information Technology

You might also like to view...

Any updates made to the requirements baseline are performed using what choice below?

A. Configuration management B. Project planning C. Risk management D. Measurement process

Computer Science & Information Technology

Describe the three events that occur when a user is configured to use roaming profiles and logs on to the virtual desktop for the first time.

What will be an ideal response?

Computer Science & Information Technology

An image inserted into the header of a worksheet displays on top of the data

Indicate whether the statement is true or false.

Computer Science & Information Technology

What happens to processes on the ready queue in a round-robin CPU scheduling scheme?

A. they are pushed and put in the priority queue B. they are popped and allocated memory C. they are pushed to the end of the queue D. they are popped and given a slice of CPU time

Computer Science & Information Technology