We have decided to change the type of hashing we use to a newer version that is collision resistant. What happens when a hash collision occurs?
A. We have decided to change the type of hashing we use to a newer version that is collision resistant. What happens when a hash collision occurs?
- You can figure out the plain text from the hash.
- When two different plaintexts produce the same hash.
- The same plain text produces two different hashes using the same hash function.
- A variable-length text produces a fixed-length hash.
B.“Alice” and “Bob” are talking about hashing and they use the abbreviation MAC. What are they talking about?
- Message Authentication Code.
- Media Access Control.
- Mandatory Access Control.
- Message Access Code.
C.Which one of the following is not one of the basic requirements for a cryptographic hash function?
- The function must be collision free.
- The function must work on fixed-length input.
- The function must be relatively easy to compute for any input.
- The function must be one way.
D.Bob wants to produce a message digest of a 2,048-byte message he plans to send to Alice. If he uses the SHA-1 hashing
- 2048 bits
- 1024 bits
- 160 bits
- 512 bits
E.What kind of attack makes the Caesar cipher virtually unusable?
- Escrow attack
- Man-in-the-middle attack
- Transposition attack
- Frequency Analysis
F.When an attacker is using a brute force attack to break a password, what are they doing?
- Trying to recover the key without breaking the encryption.
- Looking at the hash values and comparing it to thousands or millions of pre-calculated hashes.
- Looking at common letter frequency to guess the plaintext.
- Trying every possible key to, over time, break any encryption
Trending now
This is a popular solution!
Step by step
Solved in 2 steps