Explain how the use of the secure hash of an object to identify and route messages to it ensures
that it is tamper-proof. What properties are required of the hash function? How can integrity be
maintained even if a substantial proportion of peer nodes are subverted?

What will be an ideal response?


• If the routing mechanism is secure, then objects will only be contactable at an address that is derived
from the secure hash.
• More importantly, even if the routing mechanism and some peer nodes are compromised, a client can
request the content of the object and check its validity by computing the secure hash and comparing it
with the GUID.
• The secure hash must be a one-way function for which it is computationally infeasible to generate two
objects that hash to the same result. Else an attacker could store one value and then replace it with the
other at a later date.

Computer Science & Information Technology

You might also like to view...

Online auctions are the most common ways to purchase items online from other individuals.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When fields appear in a form, they appear in ____.

A. ascending order B. commands C. controls D. lists

Computer Science & Information Technology

____ is most useful when keys are assigned serially, such as we often see in employee numbers and part numbers.

A. Direct hashing B. Fold boundary C. Fold shift D. Rotation hashing

Computer Science & Information Technology

Which  number system is used to store data in memory?

A. decimal B. octal C. binary D. hexadecimal

Computer Science & Information Technology