Explain how the use of the secure hash of an object to identify and route messages to it ensures
that it is tamper-proof. What properties are required of the hash function? How can integrity be
maintained even if a substantial proportion of peer nodes are subverted?
What will be an ideal response?
• If the routing mechanism is secure, then objects will only be contactable at an address that is derived
from the secure hash.
• More importantly, even if the routing mechanism and some peer nodes are compromised, a client can
request the content of the object and check its validity by computing the secure hash and comparing it
with the GUID.
• The secure hash must be a one-way function for which it is computationally infeasible to generate two
objects that hash to the same result. Else an attacker could store one value and then replace it with the
other at a later date.
You might also like to view...
Online auctions are the most common ways to purchase items online from other individuals.
Answer the following statement true (T) or false (F)
When fields appear in a form, they appear in ____.
A. ascending order B. commands C. controls D. lists
____ is most useful when keys are assigned serially, such as we often see in employee numbers and part numbers.
A. Direct hashing B. Fold boundary C. Fold shift D. Rotation hashing
Which number system is used to store data in memory?
A. decimal B. octal C. binary D. hexadecimal