Cryptography and Network Security

Computing

Quiz 11 :

Cryptographic Hash Functions

Quiz 11 :

Cryptographic Hash Functions

Question Type
search
arrow
Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.
Free
True False
Answer:

Answer:

False

Tags
Choose question tag
close menu
arrow
the Secure Hash Algorithm design closely models, and is based on, the hash function __________ .
Free
Multiple Choice
Answer:

Answer:

D

Tags
Choose question tag
close menu
arrow
Big-endian format is the most significant byte of a word in the low-address byte position.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
It is possible to use a hash function but no encryption for message authentication.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the most widely used hash function has been the Whirlpool.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the way to measure the resistance of a hash algorithm to cryptanalysis is to compare its strength to the effort required for a brute-force attack.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A good hash function has the property that "the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random".
True False
Answer:
Tags
Choose question tag
close menu
arrow
A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-specified hash result or (b) two data objects that map to the same hash result.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
the cryptographic hash function requirement that guarantees that it is impossible to find an alternative message with the same hash value as a given message and prevents forgery when an encrypted hash code is used is the ___________ .
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Whirlpool is a popular cryptographic hash function.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the principal object of a hash function is __________ .
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
It can be shown that some form of birthday attack will succeed against any hash scheme involving the use of cipher block chaining without a secret key, provided that either the resulting hash code is small enough or that a larger hash code can be decomposed into independent subcodes.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Virtually all cryptographic hash functions involve the iterative use of a compression function.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Hash functions can be used for intrusion and virus detections.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the cryptographic hash function is not a versatile cryptographic algorithm.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Hash functions are commonly used to create a one-way password file.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the SHA-512 algorithm has the property that every bit of the hash code is a function of every bit of the input.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A ___________ accepts a variable length block of data as input and produces a fixed size hash value h = H(M).
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Encryption hardware is optimized toward smaller data sizes.
True False
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 45