Filters
Question type

Study Flashcards

__________ are measures of the number of potential collisions for a given hash value.


A) MACs
B) Primitives
C) Hash codes
D) Preimages

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Message authentication is achieved using a __________ .


A) DES
B) MDF
C) SHA
D) MAC

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

If collision resistance is required the value _________ determines the strength of the hash code against brute-force attacks.

Correct Answer

verifed

verified

SHA-1 produces a hash value of __________ bits.


A) 224
B) 160
C) 384
D) 256

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The effort required for a collision resistant attack is explained by a mathematical result referred to as the ___________ .


A) Whirlpool
B) birthday paradox
C) hash value
D) message authentication code

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

The hash algorithm involves repeated use of a __________ function,f,that takes two inputs an n-bit input and a b-bit block)and produces an n-bit output.

Correct Answer

verifed

verified

Three new versions of SHA with hash value lengths of 256,384,and 512 bits are collectively known as __________ .


A) SHA-3
B) SHA-1
C) SHA-2
D) SHA-0

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

The most important and widely used family of cryptographic hash functions is the __________ family.

Correct Answer

verifed

verified

Secure Hash Algorithm SHA)

A message authentication code is also known as a __________ hash function.

Correct Answer

verifed

verified

keyed

Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.

A) True
B) False

Correct Answer

verifed

verified

The two categories of attacks on hash functions are __________ attacks and cryptanalysis.

Correct Answer

verifed

verified

The evaluation criteria for SHA-3 are security,___________,and algorithm and implementation characteristics.

Correct Answer

verifed

verified

SHA-1 is very similiar in structure and in the basic mathematical operations used to __________ and SHA-0.

Correct Answer

verifed

verified

The Secure Hash Algorithm was developed by the ___________ .


A) ITIL
B) IEEE
C) ISO
D) NIST

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

The __________ resistant guarantees that it is impossible to find an alternative message with the same hash value as a given message.

Correct Answer

verifed

verified

Hash functions can be used for intrusion and virus detections.

A) True
B) False

Correct Answer

verifed

verified

The kind of hash function needed for security applications is referred to as a __________ hash function.

Correct Answer

verifed

verified

An ideal hash algorithm will require a cryptanalytic effort __________ the brute-force effort.


A) less than or equal to
B) greater than or equal to
C) less than
D) greater than

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Virtually all cryptographic hash functions involve the iterative use of a compression function.

A) True
B) False

Correct Answer

verifed

verified

True

When a hash function is used to provide message authentication,the hash function value is often referred to as a ___________ .

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer