Exam 11: Cryptographic Hash Functions
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
A message authentication code is also known as a __________ hash function.
Free
(Essay)
4.8/5
(41)
Correct Answer:
keyed
Virtually all cryptographic hash functions involve the iterative use of a compression function.
Free
(True/False)
4.8/5
(33)
Correct Answer:
True
The most important and widely used family of cryptographic hash functions is the __________ family.
Free
(Essay)
4.8/5
(38)
Correct Answer:
Secure Hash Algorithm SHA)
The Secure Hash Algorithm was developed by the ___________ .
(Multiple Choice)
4.7/5
(30)
__________ are measures of the number of potential collisions for a given hash value.
(Multiple Choice)
4.8/5
(36)
Three new versions of SHA with hash value lengths of 256,384,and 512 bits are collectively known as __________ .
(Multiple Choice)
4.8/5
(40)
Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.
(True/False)
4.9/5
(25)
If collision resistance is required the value _________ determines the strength of the hash code against brute-force attacks.
(Essay)
4.7/5
(37)
The hash algorithm involves repeated use of a __________ function,f,that takes two inputs an n-bit input and a b-bit block)and produces an n-bit output.
(Essay)
4.8/5
(42)
The __________ resistant guarantees that it is impossible to find an alternative message with the same hash value as a given message.
(Essay)
4.8/5
(33)
The kind of hash function needed for security applications is referred to as a __________ hash function.
(Essay)
4.9/5
(38)
The evaluation criteria for SHA-3 are security,___________,and algorithm and implementation characteristics.
(Essay)
4.9/5
(39)
The effort required for a collision resistant attack is explained by a mathematical result referred to as the ___________ .
(Multiple Choice)
4.9/5
(24)
The two categories of attacks on hash functions are __________ attacks and cryptanalysis.
(Essay)
4.9/5
(39)
An ideal hash algorithm will require a cryptanalytic effort __________ the brute-force effort.
(Multiple Choice)
4.9/5
(37)
When a hash function is used to provide message authentication,the hash function value is often referred to as a ___________ .
(Essay)
4.8/5
(26)
SHA-1 is very similiar in structure and in the basic mathematical operations used to __________ and SHA-0.
(Essay)
4.8/5
(36)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)