Home » Cryptography » Cryptography MCQs

# MCQ | Hash Function Technique

Here, we have a **set of multiple-choice questions and answers (quiz) on Hash Function Technique**.

Submitted by Monika Sharma, on March 23, 2020

**1) Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.**

- 1024
- 512
- 256
- 1248

**Answer:** a. 1024

**Explanation:**

As we study, the message is divided into blocks of size 1024 bits, and the output produced is a 512-bit message digest and uses the 512-bit buffer till 80 rounds.

**2) When a hash function is used to provide message authentication, the hash function value is called to as:**

- Message Field
- Message Digest
- Message Score
- Message Leap

**Answer:** b. Message Digest

**Explanation:**

We know that the hash function providing message authentication is referred to as massage digest in cryptography.

**3) Which of the following are used to create a message digest by the network security protocols?**

- RSA
- SHA-1
- DES
- MD5

**Answer:** b. and c. SHA-1 and MD5

**Explanation:**

**RSA**: Basically, it is an algorithm used to encrypt and decrypt messages.**SHA 1**: Secure Hash Algorithm 1 is a cryptographic hash function in cryptography. It produces a 160 bit (20 bytes) hash value in cryptography.**DES**: Data Encryption Standard is a symmetric key algorithm for encryption of electronic data in cryptography.**MD5**: It is a widely used cryptographic hash function that produces a 128-bit hash value in cryptography.

**4) What is the output of the N 1024-bit blocks from the Nth stage in this?**

- 512 bits
- 1024 bits
- N x 1024bits
- N x 512 bits

**Answer:** a. 512 bits

**Explanation:**

We know that when we use SHA 512 we take 1024 bit plaintext into this algorithm and get the output as 512 bit which is fixed.

**5) What is the output of a cryptographic hash function means?**

- A variable set of bits
- A fixed set of bits, derived from one-way mathematical operations
- An output which may be easily discovered by an adversary
- Outputs of such functions are of no importance

**Answer:** b. A fixed set of bits, derived from one-way mathematical operations

**Explanation:**

The output of a cryptographic hash function means as a fixed set of bits, derived from one-way mathematical operations.

**6) A hash function is a _____ that converts a numerical input value into another compressed numerical value.**

- Abstract view
- Mathematical function
- Both A and B
- None of the mentioned above

**Answer:** b. Mathematical function

**Explanation:**

A hash function is a mathematical function that turns a numerical input value into another numerical input value that has been compressed. When using the hash function, the input can be of any length, but the result is always of a set length.

**7) A cryptographic hash function must be deterministic,**

- True
- False

**Answer:** a. True

**Explanation:**

Determinism is required in a cryptographic hash function, which means that the same message must always result in the same hash value. The hash value for any given message can be computed in a short amount of time. It is not possible to generate a message that contains the hash value of a given value. It is impossible to find two different messages that have the same hash value in the same manner.

**8) _____ and encryption is two separate cryptographic processes.**

- Hashing
- Decryption
- Processing
- None of the mentioned above

**Answer:** a. Hashing

**Explanation:**

The cryptographic methods of hashing and encryption are distinct from one another. A cryptographic hash function, on the other hand, is distinct. Because hashing is a one-way process, after we've hashed data, we won't be able to restore it to its original format.

**9) Amongst which of the following is /are good for Hashes,**

- Password protection
- Data integrity / file verification
- Digital signatures and virus signatures
- All of the mentioned above

**Answer:** d. All of the mentioned above

**Explanation:**

Despite the fact that hashing is not encryption, it is a type of cryptography that can be used for a variety of purposes, including password protection, data integrity / file verification, digital signatures, and virus identification.

**10) Digital Signatures authenticates the sender by appending the original message with the ____ digest.**

- Decrypted message
- Encrypted message
- Systematic approach
- None of the mentioned above

**Answer:** b. Encrypted message

**Explanation:**

A digital signature verifies the identity of the sender by attaching the original message together with the encrypted message digest to the end of the message. The sender encrypts the message using the private key in order to assure nonrepudiation, while the hash safeguards against data tampering and ensures integrity, as shown in the equation: digital signature=private sender's key (hash (message).

**More...**

- MCQ | Cryptography Basics
- MCQ | Cryptography Ciphers (Level: Easy) | Set 1
- MCQ | Cryptography Ciphers (Level: Easy) | Set 2
- MCQ | Cryptography Hash Functions (Level: Easy)
- MCQ | Cryptography Techniques of Block Cipher
- MCQ | Block Cipher as IDEA, DES, AES, RSA in Cryptography
- MCQ | Quantum Cryptography
- MCQ | Modes of Operations in Block Cipher

What's New

- Business Environment MCQs
- Sustainable Development MCQs
- Marginal Costing and Absorption Costing MCQs
- Globalisation MCQs
- Indian Economy MCQs
- Retained Earnings MCQs
- Depreciation MCQs
- Partnership MCQs
- Sole Proprietorship MCQs
- Goods and Services Tax (GST) MCQs
- Cooperative Society MCQs
- Capital Market MCQs
- Business Studies MCQs
- Basic Accounting MCQs
- MIS Executive Interview Questions
- Go Language Interview Questions

Top Interview Coding Problems/Challenges!

- Run-length encoding (find/print frequency of letters in a string)
- Sort an array of 0's, 1's and 2's in linear time complexity
- Checking Anagrams (check whether two string is anagrams or not)
- Relative sorting algorithm
- Finding subarray with given sum
- Find the level in a binary tree with given sum K
- Check whether a Binary Tree is BST (Binary Search Tree) or not
- 1[0]1 Pattern Count
- Capitalize first and last letter of each word in a line
- Print vertical sum of a binary tree
- Print Boundary Sum of a Binary Tree
- Reverse a single linked list
- Greedy Strategy to solve major algorithm problems
- Job sequencing problem
- Root to leaf Path Sum
- Exit Point in a Matrix
- Find length of loop in a linked list
- Toppers of Class
- Print All Nodes that don't have Sibling
- Transform to Sum Tree
- Shortest Source to Destination Path

Comments and Discussions!