Exam 11: Cryptographic Hash Functions

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the compression function used in secure hash algorithms falls into one of two categories: a function specifically designed for the hash function or an algorithm based on a ___________ .

(Short Answer)
4.8/5
(33)

the __________ resistant guarantees that it is impossible to find an alternative message with the same hash value as a given message.

(Short Answer)
4.9/5
(31)

the most important and widely used family of cryptographic hash functions is the __________ family.

(Short Answer)
4.7/5
(39)

three new versions of SHA with hash value lengths of 256, 384, and 512 bits are collectively known as __________ .

(Multiple Choice)
4.8/5
(32)

A hash function that satisfies the properties of variable input size, fixed output size, efficiency, preimage resistant and second preimage resistant is referred to as a __________.

(Multiple Choice)
4.8/5
(32)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)