Exam 11: Cryptographic Hash Functions

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A message authentication code is also known as a __________ hash function.

Free
(Essay)
4.8/5
(41)
Correct Answer:
Verified

keyed

Virtually all cryptographic hash functions involve the iterative use of a compression function.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

True

The most important and widely used family of cryptographic hash functions is the __________ family.

Free
(Essay)
4.8/5
(38)
Correct Answer:
Verified

Secure Hash Algorithm SHA)

The Secure Hash Algorithm was developed by the ___________ .

(Multiple Choice)
4.7/5
(30)

__________ are measures of the number of potential collisions for a given hash value.

(Multiple Choice)
4.8/5
(36)

Three new versions of SHA with hash value lengths of 256,384,and 512 bits are collectively known as __________ .

(Multiple Choice)
4.8/5
(40)

SHA-1 produces a hash value of __________ bits.

(Multiple Choice)
4.9/5
(41)

Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.

(True/False)
4.9/5
(25)

If collision resistance is required the value _________ determines the strength of the hash code against brute-force attacks.

(Essay)
4.7/5
(37)

Message authentication is achieved using a __________ .

(Multiple Choice)
4.8/5
(31)

The hash algorithm involves repeated use of a __________ function,f,that takes two inputs an n-bit input and a b-bit block)and produces an n-bit output.

(Essay)
4.8/5
(42)

The __________ resistant guarantees that it is impossible to find an alternative message with the same hash value as a given message.

(Essay)
4.8/5
(33)

The kind of hash function needed for security applications is referred to as a __________ hash function.

(Essay)
4.9/5
(38)

The evaluation criteria for SHA-3 are security,___________,and algorithm and implementation characteristics.

(Essay)
4.9/5
(39)

The effort required for a collision resistant attack is explained by a mathematical result referred to as the ___________ .

(Multiple Choice)
4.9/5
(24)

Hash functions can be used for intrusion and virus detections.

(True/False)
4.8/5
(36)

The two categories of attacks on hash functions are __________ attacks and cryptanalysis.

(Essay)
4.9/5
(39)

An ideal hash algorithm will require a cryptanalytic effort __________ the brute-force effort.

(Multiple Choice)
4.9/5
(37)

When a hash function is used to provide message authentication,the hash function value is often referred to as a ___________ .

(Essay)
4.8/5
(26)

SHA-1 is very similiar in structure and in the basic mathematical operations used to __________ and SHA-0.

(Essay)
4.8/5
(36)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)