Deck 11: Cryptographic Hash Functions
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 11: Cryptographic Hash Functions
1
The way to measure the resistance of a hash algorithm to cryptanalysis is to compare its strength to the effort required for a brute-force attack.
True
2
Hash functions can be used for intrusion and virus detections.
True
3
Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.
False
4
The cryptographic hash function requirement that guarantees that it is impossible to find an alternative message with the same hash value as a given message and prevents forgery when an encrypted hash code is used is the ___________ .
A)collision resistant
B)pseudorandomness
C)preimage resistant
D)second preimage resistant
A)collision resistant
B)pseudorandomness
C)preimage resistant
D)second preimage resistant
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
A ___________ accepts a variable length block of data as input and produces a fixed size hash value h = HM).
A)hash resistance
B)hash value
C)hash function
D)hash code
A)hash resistance
B)hash value
C)hash function
D)hash code
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Big-endian format is the most significant byte of a word in the low-address byte position.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The Secure Hash Algorithm design closely models,and is based on,the hash function __________ .
A)MD5
B)FIPS 180
C)RFC 4634
D)MD4
A)MD5
B)FIPS 180
C)RFC 4634
D)MD4
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
It can be shown that some form of birthday attack will succeed against any hash scheme involving the use of cipher block chaining without a secret key,provided that either the resulting hash code is small enough or that a larger hash code can be decomposed into independent subcodes.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The cryptographic hash function is not a versatile cryptographic algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The SHA-512 algorithm has the property that every bit of the hash code is a function of every bit of the input.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Encryption hardware is optimized toward smaller data sizes.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Whirlpool is a popular cryptographic hash function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Virtually all cryptographic hash functions involve the iterative use of a compression function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Hash functions are commonly used to create a one-way password file.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A ___________ is an algorithm for which it is computationally infeasible to find either a)a data object that maps to a pre-specified hash result or b)two data objects that map to the same hash result.
A)cryptographic hash function
B)strong collision resistance
C)one-way hash function
D)compression function
A)cryptographic hash function
B)strong collision resistance
C)one-way hash function
D)compression function
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The most widely used hash function has been the Whirlpool.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
It is possible to use a hash function but no encryption for message authentication.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A good hash function has the property that the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The principal object of a hash function is __________ .
A)data integrity
B)compression
C)collision resistance
D)mapping messages
A)data integrity
B)compression
C)collision resistance
D)mapping messages
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A hash function that satisfies the properties of variable input size,fixed output size,efficiency,preimage resistant,second preimage resistant and __________ is referred to as a strong hash function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A hash function that satisfies the properties of variable input size,fixed output size,efficiency,preimage resistant and second preimage resistant is referred to as a __________.
A)strong hash function
B)collision resistant function
C)weak hash function
D)preimage resistant function
A)strong hash function
B)collision resistant function
C)weak hash function
D)preimage resistant function
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The kind of hash function needed for security applications is referred to as a __________ hash function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
If collision resistance is required the value _________ determines the strength of the hash code against brute-force attacks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The effort required for a collision resistant attack is explained by a mathematical result referred to as the ___________ .
A)Whirlpool
B)birthday paradox
C)hash value
D)message authentication code
A)Whirlpool
B)birthday paradox
C)hash value
D)message authentication code
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
"Given a hash function H,with n possible outputs and a specific value Hx),if H is applied to k random inputs,what must be the value of k so that the probability that at least one input y satisfies Hy)= Hx)is 0.5?" is a reference to the __________ .
A)authentication code
B)collision resistant
C)big endian
D)birthday attack
A)authentication code
B)collision resistant
C)big endian
D)birthday attack
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ are measures of the number of potential collisions for a given hash value.
A)MACs
B)Primitives
C)Hash codes
D)Preimages
A)MACs
B)Primitives
C)Hash codes
D)Preimages
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The Secure Hash Algorithm was developed by the ___________ .
A)ITIL
B)IEEE
C)ISO
D)NIST
A)ITIL
B)IEEE
C)ISO
D)NIST
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
Requirements for a cryptographic hash function include ___________ which is the one-way property.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
When a hash function is used to provide message authentication,the hash function value is often referred to as a ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
SHA-1 produces a hash value of __________ bits.
A)224
B)160
C)384
D)256
A)224
B)160
C)384
D)256
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The most important and widely used family of cryptographic hash functions is the __________ family.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The two categories of attacks on hash functions are __________ attacks and cryptanalysis.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The __________ resistant guarantees that it is impossible to find an alternative message with the same hash value as a given message.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
Message authentication is achieved using a __________ .
A)DES
B)MDF
C)SHA
D)MAC
A)DES
B)MDF
C)SHA
D)MAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A __________ is an attack based on weaknesses in a particular cryptographic algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
__________ is a mechanism or service used to verify the integrity of a message.
A)Message authentication
B)Data compression
C)Data mapping
D)Message digest
A)Message authentication
B)Data compression
C)Data mapping
D)Message digest
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
An ideal hash algorithm will require a cryptanalytic effort __________ the brute-force effort.
A)less than or equal to
B)greater than or equal to
C)less than
D)greater than
A)less than or equal to
B)greater than or equal to
C)less than
D)greater than
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The compression function used in secure hash algorithms falls into one of two categories: a function specifically designed for the hash function or an algorithm based on a ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Three new versions of SHA with hash value lengths of 256,384,and 512 bits are collectively known as __________ .
A)SHA-3
B)SHA-1
C)SHA-2
D)SHA-0
A)SHA-3
B)SHA-1
C)SHA-2
D)SHA-0
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The hash value of a message in the __________ application is encrypted with a user's private key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A message authentication code is also known as a __________ hash function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
SHA-1 is very similiar in structure and in the basic mathematical operations used to __________ and SHA-0.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The hash algorithm involves repeated use of a __________ function,f,that takes two inputs an n-bit input and a b-bit block)and produces an n-bit output.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The evaluation criteria for SHA-3 are security,___________,and algorithm and implementation characteristics.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck