Multiple Choice
The Secure Hash Algorithm design closely models,and is based on,the hash function __________ .
A) MD5
B) FIPS 180
C) RFC 4634
D) MD4
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q11: SHA-1 is very similiar in structure and
Q17: The two categories of attacks on hash
Q26: The principal object of a hash function
Q27: The way to measure the resistance of
Q32: When a hash function is used to
Q33: A good hash function has the property
Q35: Whirlpool is a popular cryptographic hash function.
Q36: An ideal hash algorithm will require a
Q40: A weak hash function is sufficient to
Q45: A hash function that satisfies the properties