Comparison of the birthday problem (1) and birthday attack (2) by CMG Lee. In (1), collisions are found within one set, in this case, 3 out of 276 pairings of the 24 lunar astronauts. In (2), collisions are found between two sets, in this case, 1 out of 256 pairings of only the first bytes of SHA-256 hashes of 16 variants each of benign and harmful contracts.
Note: A Python script to generate the combinations and hashes is in a comment in the SVG file.
to share – to copy, distribute and transmit the work
to remix – to adapt the work
Under the following conditions:
attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled GNU Free Documentation License.http://www.gnu.org/copyleft/fdl.htmlGFDLGNU Free Documentation Licensetruetrue
You may select the license of your choice.
Captions
Add a one-line explanation of what this file represents
{{Information |Description=Comparison of the birthday problem (1) and birthday attack (2) by CMG Lee. In (1), collisions are found within one set, in this case, 3 out of 276 pairings of the 24 lunar astronauts. In (2), collisions are found between two sets, in this case, 1 out of 256 pairings of only the first bytes of SHA-256 hashes of 16 variants each of benign and harmful contracts. |Source={{own}} |Date= |Author= Cmglee |Permission= |other_versions= }} [[Category:Birthday...
This file contains additional information, probably added from the digital camera or scanner used to create or digitize it.
If the file has been modified from its original state, some details may not fully reflect the modified file.
Short title
birthday paradox vs attack
Image title
Comparison of the birthday problem (1) and birthday attack (2) by CMG Lee. In (1), collisions are found within one set, in this case, 3 out of 276 pairings of the 24 lunar astronauts. In (2), collisions are found between two sets, in this case, 1 out of 256 pairings of only the first bytes of SHA-256 hashes of 16 variants each of benign and harmful contracts.