Hashing

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How is a Message Integrity Check (MIC) different from a Message Authentication Code (MAC)?

A MIC only hashes the message while a MAC incorporates a secret key. A MIC can be thought of as just a checksum or hash digest of a message while a MAC uses a shared secret to generate the checksum. This also makes it authenticated since the other party must also have the same shared secret, preventing a third party from forging the checksum data.

______ is a type of function or operation that takes in an arbitrary data input and maps it to an output of a fixed size, called a hash or a digest.

A hash function Hashing is a special type of function that's widely used in computing and especially within security.

How can one defend against brute-force password attacks? Check all that apply.

Enforce the use of strong passwords. Incorporate salts into password hashing. A brute-force password attack involves guessing the password. So, having complex and long passwords will make this task much harder and will require more time and resources for the attacker to succeed. Incorporating salts into password hashes will protect against rainbow table attacks, and running passwords through the hashing algorithm lots of times also raises the bar for an attacker, requiring more resources for each password guess.

How is hashing different from encryption?

Hashing operations are one-directional. Hash functions, by definition, are one-way, meaning that it's not possible to take a hash and recover the input that generated the hash. Encryption, on the other hand, is two-directional, since data can be both encrypted and decrypted.

What is a hash collision?

When two different files generate the same hash digest. If two different files result in the same hash, it is referred to as a hash collision. Hash collisions aren't good, as this would allow an attacker to create a fake file that would pass hash verification.


Set pelajaran terkait

Chapter 17 endocrine system part two

View Set

Sexually Transmitted Bacterial Diseases - Chapter Exam 10

View Set

Respiratory: CO2 Transport, CO, and Cyanide

View Set

Health Assessment Chapter 25 Prep-U Neurological Assessment

View Set

CHAPTER 22 Renaissance and Mannerism in Cinquecento Italy

View Set

Chapter 1 Introduction to Computer Repair

View Set

Radiation Protection Module 3 Personnel Monitoring

View Set

Chapter 61: Caring for Clients Requiring Orthopedic Treatment

View Set

unit 15- posterior forearm and hand

View Set