Filters
Question type

Study Flashcards

the Secure Hash Algorithm was developed by the ___________ .


A) ItIL
B) IEEE
C) ISO
D) NISt

E) All of the above
F) None of the above

Correct Answer

verifed

verified

It is possible to use a hash function but no encryption for message authentication.

A) True
B) False

Correct Answer

verifed

verified

Big-endian format is the most significant byte of a word in the low-address byte position.

A) True
B) False

Correct Answer

verifed

verified

Requirements for a cryptographic hash function include ___________ which is the one-way property.

Correct Answer

verifed

verified

the two categories of attacks on hash functions are __________ attacks and cryptanalysis.

Correct Answer

verifed

verified

Whirlpool is a popular cryptographic hash function.

A) True
B) False

Correct Answer

verifed

verified

Virtually all cryptographic hash functions involve the iterative use of a compression function.

A) True
B) False

Correct Answer

verifed

verified

When a hash function is used to provide message authentication, the hash function value is often referred to as a ___________ .

Correct Answer

verifed

verified

"Given a hash function H, with n possible outputs and a specific value H(x) , if H is applied to k random inputs, what must be the value of k so that the probability that at least one input y satisfies H(y) = H(x) is 0.5" is a reference to the __________ .


A) authentication code
B) collision resistant
C) big endian
D) birthday attack

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.

A) True
B) False

Correct Answer

verifed

verified

Message authentication is achieved using a __________ .


A) DES
B) MDF
C) SHA
D) MAC

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

the cryptographic hash function is not a versatile cryptographic algorithm.

A) True
B) False

Correct Answer

verifed

verified

A hash function that satisfies the properties of variable input size, fixed output size, efficiency, preimage resistant, second preimage resistant and __________ is referred to as a strong hash function.

Correct Answer

verifed

verified

If collision resistance is required the value _________ determines the strength of the hash code against brute-force attacks.

Correct Answer

verifed

verified

the way to measure the resistance of a hash algorithm to cryptanalysis is to compare its strength to the effort required for a brute-force attack.

A) True
B) False

Correct Answer

verifed

verified

Hash functions can be used for intrusion and virus detections.

A) True
B) False

Correct Answer

verifed

verified

the principal object of a hash function is __________ .


A) data integrity
B) compression
C) collision resistance
D) mapping messages

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

the effort required for a collision resistant attack is explained by a mathematical result referred to as the ___________ .


A) Whirlpool
B) birthday paradox
C) hash value
D) message authentication code

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

An ideal hash algorithm will require a cryptanalytic effort __________ the brute-force effort.


A) less than or equal to
B) greater than or equal to
C) less than
D) greater than

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A good hash function has the property that "the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random".

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer