7.3 Hashing

¡Supera tus tareas y exámenes ahora con Quizwiz!

Hash

A function that converts a variable-length string into a compressed, fixed-length value known as a message digest or hash.

Hash collision

A hash collision occurs when two files generate the same hash.

What are some common uses for hashing?

File Integrity, Digital signature and Secure logon credential exchange

Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate? - MD5 - HMAC - RIPEMD - SHA

HMAC

Which of the following is used to verify that a downloaded file has not been altered? - Asymmetric encryption - Symmetric encryption - Hash - Private key

Hash

A birthday attack focuses on which of the following? - Hashing algorithms - VPN links - Encrypted files - E-commerce

Hashing algorithms

Rainbow table

A rainbow table is a table of passwords and their generated hashes.

What type of attack takes advantage of hash collisions?

Birthday attacks

When two different messages produce the same hash value, what has occurred? - Hash value - Birthday attack - High amplification - Collision

Collision

Hashing algorithms are used to perform which of the following activities? - Create a message digest. - Provide for non-repudiation. - Encrypt bulk data for communications exchange. - Provide a means for exchanging small amounts of data securely over a public network.

Create a message digest.

What are the five characteristics of a hash function?

Deterministic, Quick and efficient, One-way, Collision resistant, and Avalanche effect

What is the output of hashing called?

Digest or hash

Which of the following is the weakest hashing algorithm? - AES - SHA-1 - MD5 - DES

MD5

What are the main hashing algorithms used?

MD5, SHA, HMAC, and RIPEMD.

An attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or she has. Which type of attack is the attacker using? - RIPEMD - Brute force - Cracking - Rainbow

Rainbow

Which of the following does not or cannot produce a hash value of 128 bits? - SHA-1 - MD5 - RIPEMD - MD2

SHA-1

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called? - Deterministic - Salting - Avalanche - Collision

Salting

You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file? - Your copy is the same as the copy posted on the website. - You can prove the source of the file. - You are the only one able to open the downloaded file. - No one has read the file contents as it was downloaded.

Your copy is the same as the copy posted on the website.


Conjuntos de estudio relacionados

Ch 58: Professional Roles and Leadership

View Set

All ortho tests - Part 4 board review

View Set

African American History Midterm

View Set

Pénzügyi és Biztosítási piac szereplői

View Set

CH 5 cultural awareness and health practices

View Set