Filters
Question type

Study Flashcards

the hash value of a message in the __________ application is encrypted with a user's private key.

Correct Answer

verifed

verified

digital signature

A __________ is an attack based on weaknesses in a particular cryptographic algorithm.

Correct Answer

verifed

verified

the cryptographic hash function requirement that guarantees that it is impossible to find an alternative message with the same hash value as a given message and prevents forgery when an encrypted hash code is used is the ___________ .


A) collision resistant
B) pseudorandomness
C) preimage resistant
D) second preimage resistant

Correct Answer

verifed

verified

A message authentication code is also known as a __________ hash function.

Correct Answer

verifed

verified

Hash functions are commonly used to create a one-way password file.

Correct Answer

verifed

verified

the Secure Hash Algorithm design closely models, and is based on, the hash function __________ .


A) MD5
B) FIPS 180
C) RFC 4634
D) MD4

Correct Answer

verifed

verified

A ___________ accepts a variable length block of data as input and produces a fixed size hash value h = H(M) .


A) hash resistance
B) hash value
C) hash function
D) hash code

Correct Answer

verifed

verified

SHA-1 is very similiar in structure and in the basic mathematical operations used to __________ and SHA-0.

Correct Answer

verifed

verified

__________ is a mechanism or service used to verify the integrity of a message.


A) Message authentication
B) Data compression
C) Data mapping
D) Message digest

Correct Answer

verifed

verified

A

A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-specified hash result or (b) two data objects that map to the same hash result.


A) cryptographic hash function
B) strong collision resistance
C) one-way hash function
D) compression function

Correct Answer

verifed

verified

__________ are measures of the number of potential collisions for a given hash value.


A) MACs
B) Primitives
C) Hash codes
D) Preimages

Correct Answer

verifed

verified

Encryption hardware is optimized toward smaller data sizes.

Correct Answer

verifed

verified

the hash algorithm involves repeated use of a __________ function, f, that takes two inputs (an n-bit input and a b-bit block) and produces an n-bit output.

Correct Answer

verifed

verified

Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.

Correct Answer

verifed

verified

the most widely used hash function has been the Whirlpool.

Correct Answer

verifed

verified

the evaluation criteria for SHA-3 are security, ___________, and algorithm and implementation characteristics.

Correct Answer

verifed

verified

cost

It can be shown that some form of birthday attack will succeed against any hash scheme involving the use of cipher block chaining without a secret key, provided that either the resulting hash code is small enough or that a larger hash code can be decomposed into independent subcodes.

Correct Answer

verifed

verified

the SHA-512 algorithm has the property that every bit of the hash code is a function of every bit of the input.

Correct Answer

verifed

verified

SHA-1 produces a hash value of __________ bits.


A) 224
B) 160
C) 384
D) 256

Correct Answer

verifed

verified

the kind of hash function needed for security applications is referred to as a __________ hash function.

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer