CRYPTOGRAPHIC HASH FUNCTIONS

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Message authentication is achieved using a __________ .

MAC

__________ is a mechanism or service used to verify the integrity of a message.

Message authentication

What are some approaches to producing message authentication?

Message encryption, message authentication code, digital signature

__________ are measures of the number of potential collisions for a given hash value.

Preimages

The most important and widely used family of cryptographic hash functions is the ___ family.

SHA

Three new versions of SHA with hash value lengths of 256, 384, and 512 bits are collectively known as __________ .

SHA-2

Compare message hashes and MACs

The main difference is conceptual: while hashes are used to guarantee the integrity of data, a MAC guarantees integrity AND authentication.

Given a hash function H, with n possible outputs and a specific value H(x), if H is applied to k random inputs, what must be the value of k so that the probability that at least one input y satisfies H(y) = H(x) is 0.5?" is a reference to the __________ .

birthday attack

The effort required for a collision resistant attack is explained by a mathematical result referred to as the ___________ .

birthday paradox

The two categories of attacks on hash functions are _________________ attacks and cryptanalysis.

brute-force

A hash function that satisfies the properties of variable input size, fixed output size, efficiency, preimage resistant, second preimage resistant and __________________ is referred to as a strong hash function.

collision resistant

The evaluation criteria for SHA-3 are security, _____, and algorithm and implementation characteristics.

cost

A ________________ is an attack based on weaknesses in a particular cryptographic algorithm.

cryptanalysis

The kind of hash function needed for security applications is referred to as a ________________ hash function.

cryptographic

A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-specified hash result or (b) two data objects that map to the same hash result.

cryptographic hash function

The principal object of a hash function is __________ .

data integrity

The hash value of a message in the ____________ _________ application is encrypted with a user's private key.

digital signature

(t/f) The cryptographic hash function is not a versatile cryptographic algorithm.

f

A ___________ accepts a variable length block of data as input and produces a fixed size hash value h = H(M).

hash function

A message authentication code is also known as a _______ hash function.

keyed

An ideal hash algorithm will require a cryptanalytic effort __________ the brute-force effort.

less than

When a hash function is used to provide message authentication, the hash function value is often referred to as a ____________ ______________.

message digest

Requirements for a cryptographic hash function include ____________ which is the one-way property.

preimage

The cryptographic hash function requirement that guarantees that it is impossible to find an alternative message with the same hash value as a given message and prevents forgery when an encrypted hash code is used is the ___________ .

second pre-image resistant

The ___________________ resistant guarantees that it is impossible to find an alternative message with the same hash value as a given message.

second preimage

The compression function used in secure hash algorithms falls into one of two categories: a function specifically designed for the hash function or an algorithm based on a ___________________________.

symmetric block cipher

(t/f) A good hash function has the property that the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random.

t

(t/f) A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.

t

(t/f) Hash functions are commonly used to create a one-way password file.

t

(t/f) Hash functions can be used for intrusion and virus detection.

t

(t/f) It is possible to use a hash function but no encryption for message authentication.

t

(t/f) The SHA-512 algorithm has the property that every bit of the hash code is a function of every bit of the input.

t

(t/f) The way to measure the resistance of a hash algorithm to cryptanalysis is to compare its strength to the effort required for a brute-force attack.

t

(t/f) Virtually all cryptographic hash functions involve the iterative use of a compression function.

t

(t/f) big-endian format is the most significant byte of a word in the low-address byte position.

t

A hash function that satisfies the properties of variable input size, fixed output size, efficiency, preimage resistant and second preimage resistant is referred to as a __________.

weak hash function

SHA-1 produces a hash value of __________ bits.

160


Kaugnay na mga set ng pag-aaral

EAQ - Pharm and Parenteral Treatment

View Set

REL 1300- Exam 1 - PRACTICE QUESTIONS

View Set

Psychology Module 10 Chapter 8 & 11

View Set

NU473 Week 2: Evolve Elsevier EAQ Mental Health Disorders and Addictions

View Set