The secure hash algorithm design closely models, and is based on, the hash function __________ .
Show Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed. Free True False the Secure Hash Algorithm design closely models, and is based on, the hash function __________ . Free Multiple Choice Big-endian format is the most significant byte of a word in the low-address byte position. Free True False It is possible to use a hash function but no encryption for message authentication. True False A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign. True False the most widely used hash function has been the Whirlpool. True False the way to measure the resistance of a hash algorithm to cryptanalysis is to compare its strength to the effort required for a brute-force attack. True False A good hash function has the property that "the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random". True False A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-specified hash result or (b) two data objects that map to the same hash result. Multiple Choice the cryptographic hash function requirement that guarantees that it is impossible to find an alternative message with the same hash value as a given message and prevents forgery when an encrypted hash code is used is the ___________ . Multiple Choice Whirlpool is a popular cryptographic hash function. True False the principal object of a hash function is __________ . Multiple Choice It can be shown that some form of birthday attack will succeed against any hash scheme involving the use of cipher block chaining without a secret key, provided that either the resulting hash code is small enough or that a larger hash code can be decomposed into independent subcodes. True False Virtually all cryptographic hash functions involve the iterative use of a compression function. True False Hash functions can be used for intrusion and virus detections. True False
the cryptographic hash function is not a versatile cryptographic algorithm. True False Hash functions are commonly used to create a one-way password file. True False the SHA-512 algorithm has the property that every bit of the hash code is a function of every bit of the input. True False A ___________ accepts a variable length block of data as input and produces a fixed size hash value h = H(M). Multiple Choice Encryption hardware is optimized toward smaller data sizes. True False What is SHASHA1 is a first version of SHA that generates a 160-bit hash value. SHA256 is type of SHA2 that generates a 256-bit hash value. 2. The internal state size of SHA1 is 160. The internal state size of SHA256 is 256.
What hash algorithms are secure?The Secure Hash Standard specifies five secure hash algorithms, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. All five of the algorithms are iterative, one-way hash functions that can process a message to produce a condensed representation called a message digest.
What makes a secure hash function?SHA Characteristics
Cryptographic hash functions are utilized in order to keep data secured by providing three fundamental safety characteristics: pre-image resistance, second pre-image resistance, and collision resistance.
What is SHA256 and MD5?MD5 and SHA256 are two popular cryptographic algorithms, used to store sensitive data (passwords for example).
|