The secure hash algorithm design closely models, and is based on, the hash function __________ .

The secure hash algorithm design closely models, and is based on, the hash function __________ .

Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.

Free

True False

the Secure Hash Algorithm design closely models, and is based on, the hash function __________ .

Free

Multiple Choice

Big-endian format is the most significant byte of a word in the low-address byte position.

Free

True False

It is possible to use a hash function but no encryption for message authentication.

True False

A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.

True False

the most widely used hash function has been the Whirlpool.

True False

the way to measure the resistance of a hash algorithm to cryptanalysis is to compare its strength to the effort required for a brute-force attack.

True False

A good hash function has the property that "the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random".

True False

A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-specified hash result or (b) two data objects that map to the same hash result.

Multiple Choice

the cryptographic hash function requirement that guarantees that it is impossible to find an alternative message with the same hash value as a given message and prevents forgery when an encrypted hash code is used is the ___________ .

Multiple Choice

Whirlpool is a popular cryptographic hash function.

True False

the principal object of a hash function is __________ .

Multiple Choice

It can be shown that some form of birthday attack will succeed against any hash scheme involving the use of cipher block chaining without a secret key, provided that either the resulting hash code is small enough or that a larger hash code can be decomposed into independent subcodes.

True False

Virtually all cryptographic hash functions involve the iterative use of a compression function.

True False

Hash functions can be used for intrusion and virus detections.

True False

the cryptographic hash function is not a versatile cryptographic algorithm.

True False

Hash functions are commonly used to create a one-way password file.

True False

the SHA-512 algorithm has the property that every bit of the hash code is a function of every bit of the input.

True False

A ___________ accepts a variable length block of data as input and produces a fixed size hash value h = H(M).

Multiple Choice

Encryption hardware is optimized toward smaller data sizes.

True False

What is SHA

SHA1 is a first version of SHA that generates a 160-bit hash value. SHA256 is type of SHA2 that generates a 256-bit hash value. 2. The internal state size of SHA1 is 160. The internal state size of SHA256 is 256.

What hash algorithms are secure?

The Secure Hash Standard specifies five secure hash algorithms, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. All five of the algorithms are iterative, one-way hash functions that can process a message to produce a condensed representation called a message digest.

What makes a secure hash function?

SHA Characteristics Cryptographic hash functions are utilized in order to keep data secured by providing three fundamental safety characteristics: pre-image resistance, second pre-image resistance, and collision resistance.

What is SHA256 and MD5?

MD5 and SHA256 are two popular cryptographic algorithms, used to store sensitive data (passwords for example).