CS413 Module-III
CS413 Module-III
[email protected]
Module-III
Public key cryptography
digital signatures, attacks
hash functions
authentication schemes
Challenge Response Protocol
Zero Knowledge proofs
Which is same as
Simplifying, we get
This is the probability that there will NOT exist any hash code
matches between the two sets of contracts {c1, c2, . . . , ck} and
{f1, f2, . . . , fk}
Therefore the probability that there will exist at least one
match in hash code values between the set of correct contracts
and the set of fraudulent contracts is