We have decided to change the type of hashing we use to a newer version that is collision resistant. What happens when a hash collision occurs?

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
100%

A. We have decided to change the type of hashing we use to a newer version that is collision resistant. What happens when a hash collision occurs?

  1. You can figure out the plain text from the hash.
  2. When two different plaintexts produce the same hash.
  3. The same plain text produces two different hashes using the same hash function.
  4. A variable-length text produces a fixed-length hash.

B.“Alice” and “Bob” are talking about hashing and they use the abbreviation MAC. What are they talking about?

  1. Message Authentication Code.
  2. Media Access Control.
  3. Mandatory Access Control.
  4. Message Access Code.

C.Which one of the following is not one of the basic requirements for a cryptographic hash function?

  1. The function must be collision free.
  2. The function must work on fixed-length input.
  3. The function must be relatively easy to compute for any input.
  4. The function must be one way.

D.Bob wants to produce a message digest of a 2,048-byte message he plans to send to Alice. If he uses the SHA-1 hashing algorithm, what size will the message digest for this particular message is?

  1. 2048 bits
  2. 1024 bits
  3. 160 bits
  4. 512 bits

E.What kind of attack makes the Caesar cipher virtually unusable? 

  1. Escrow attack
  2. Man-in-the-middle attack
  3. Transposition attack
  4. Frequency Analysis

F.When an attacker is using a brute force attack to break a password, what are they doing? 

  1. Trying to recover the key without breaking the encryption.
  2. Looking at the hash values and comparing it to thousands or millions of pre-calculated hashes.
  3. Looking at common letter frequency to guess the plaintext.
  4. Trying every possible key to, over time, break any encryption
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Fundamentals of Blockchaining
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education