Home » Cryptography

MCQ | Hash Function Technique

Here, we have a set of multiple-choice questions and answers (quiz) on Hash Function Technique.
Submitted by Monika Sharma, on March 23, 2020

1) Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.

  1. 1024
  2. 512
  3. 256
  4. 1248

Answer: a. 1024

Explanation:

As we study, the message is divided into blocks of size 1024 bits, and the output produced is a 512-bit message digest and uses the 512-bit buffer till 80 rounds.


2) When a hash function is used to provide message authentication, the hash function value is called to as:

  1. Message Field
  2. Message Digest
  3. Message Score
  4. Message Leap

Answer: b. Message Digest

Explanation:

We know that the hash function providing message authentication is referred to as massage digest in cryptography.


3) Which of the following are used to create a message digest by the network security protocols?

  1. RSA
  2. SHA-1
  3. DES
  4. MD5

Answer: b. and c. SHA-1 and MD5

Explanation:

  • RSA: Basically, it is an algorithm used to encrypt and decrypt messages.
  • SHA 1: Secure Hash Algorithm 1 is a cryptographic hash function in cryptography. It produces a 160 bit (20 bytes) hash value in cryptography.
  • DES: Data Encryption Standard is a symmetric key algorithm for encryption of electronic data in cryptography.
  • MD5: It is a widely used cryptographic hash function that produces a 128-bit hash value in cryptography.

4) What is the output of the N 1024-bit blocks from the Nth stage in this?

  1. 512 bits
  2. 1024 bits
  3. N x 1024bits
  4. N x 512 bits

Answer: a. 512 bits

Explanation:

We know that when we use SHA 512 we take 1024 bit plaintext into this algorithm and get the output as 512 bit which is fixed.


5) What is the output of a cryptographic hash function means?

  1. A variable set of bits
  2. A fixed set of bits, derived from one-way mathematical operations
  3. An output which may be easily discovered by an adversary
  4. Outputs of such functions are of no importance

Answer: b. A fixed set of bits, derived from one-way mathematical operations

Explanation:

The output of a cryptographic hash function means as a fixed set of bits, derived from one-way mathematical operations.







Comments and Discussions

Ad: Are you a blogger? Join our Blogging forum.





Languages: » C » C++ » C++ STL » Java » Data Structure » C#.Net » Android » Kotlin » SQL
Web Technologies: » PHP » Python » JavaScript » CSS » Ajax » Node.js » Web programming/HTML
Solved programs: » C » C++ » DS » Java » C#
Aptitude que. & ans.: » C » C++ » Java » DBMS
Interview que. & ans.: » C » Embedded C » Java » SEO » HR
CS Subjects: » CS Basics » O.S. » Networks » DBMS » Embedded Systems » Cloud Computing
» Machine learning » CS Organizations » Linux » DOS
More: » Articles » Puzzles » News/Updates


© https://www.includehelp.com some rights reserved.