ADVERTISEMENT
ADVERTISEMENT

MCQ | Hash Function Technique

Here, we have a set of multiple-choice questions and answers (quiz) on Hash Function Technique.
Submitted by Monika Sharma, on March 23, 2020

1) Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.

  1. 1024
  2. 512
  3. 256
  4. 1248

Answer: a. 1024

Explanation:

As we study, the message is divided into blocks of size 1024 bits, and the output produced is a 512-bit message digest and uses the 512-bit buffer till 80 rounds.


2) When a hash function is used to provide message authentication, the hash function value is called to as:

  1. Message Field
  2. Message Digest
  3. Message Score
  4. Message Leap

Answer: b. Message Digest

Explanation:

We know that the hash function providing message authentication is referred to as massage digest in cryptography.


3) Which of the following are used to create a message digest by the network security protocols?

  1. RSA
  2. SHA-1
  3. DES
  4. MD5

Answer: b. and c. SHA-1 and MD5

Explanation:

  • RSA: Basically, it is an algorithm used to encrypt and decrypt messages.
  • SHA 1: Secure Hash Algorithm 1 is a cryptographic hash function in cryptography. It produces a 160 bit (20 bytes) hash value in cryptography.
  • DES: Data Encryption Standard is a symmetric key algorithm for encryption of electronic data in cryptography.
  • MD5: It is a widely used cryptographic hash function that produces a 128-bit hash value in cryptography.

4) What is the output of the N 1024-bit blocks from the Nth stage in this?

  1. 512 bits
  2. 1024 bits
  3. N x 1024bits
  4. N x 512 bits

Answer: a. 512 bits

Explanation:

We know that when we use SHA 512 we take 1024 bit plaintext into this algorithm and get the output as 512 bit which is fixed.


5) What is the output of a cryptographic hash function means?

  1. A variable set of bits
  2. A fixed set of bits, derived from one-way mathematical operations
  3. An output which may be easily discovered by an adversary
  4. Outputs of such functions are of no importance

Answer: b. A fixed set of bits, derived from one-way mathematical operations

Explanation:

The output of a cryptographic hash function means as a fixed set of bits, derived from one-way mathematical operations.


6) A hash function is a _____ that converts a numerical input value into another compressed numerical value.

  1. Abstract view
  2. Mathematical function
  3. Both A and B
  4. None of the mentioned above

Answer: b. Mathematical function

Explanation:

A hash function is a mathematical function that turns a numerical input value into another numerical input value that has been compressed. When using the hash function, the input can be of any length, but the result is always of a set length.


7) A cryptographic hash function must be deterministic,

  1. True
  2. False

Answer: a. True

Explanation:

Determinism is required in a cryptographic hash function, which means that the same message must always result in the same hash value. The hash value for any given message can be computed in a short amount of time. It is not possible to generate a message that contains the hash value of a given value. It is impossible to find two different messages that have the same hash value in the same manner.


8) _____ and encryption is two separate cryptographic processes.

  1. Hashing
  2. Decryption
  3. Processing
  4. None of the mentioned above

Answer: a. Hashing

Explanation:

The cryptographic methods of hashing and encryption are distinct from one another. A cryptographic hash function, on the other hand, is distinct. Because hashing is a one-way process, after we've hashed data, we won't be able to restore it to its original format.


9) Amongst which of the following is /are good for Hashes,

  1. Password protection
  2. Data integrity / file verification
  3. Digital signatures and virus signatures
  4. All of the mentioned above

Answer: d. All of the mentioned above

Explanation:

Despite the fact that hashing is not encryption, it is a type of cryptography that can be used for a variety of purposes, including password protection, data integrity / file verification, digital signatures, and virus identification.


10) Digital Signatures authenticates the sender by appending the original message with the ____ digest.

  1. Decrypted message
  2. Encrypted message
  3. Systematic approach
  4. None of the mentioned above

Answer: b. Encrypted message

Explanation:

A digital signature verifies the identity of the sender by attaching the original message together with the encrypted message digest to the end of the message. The sender encrypts the message using the private key in order to assure nonrepudiation, while the hash safeguards against data tampering and ensures integrity, as shown in the equation: digital signature=private sender's key (hash (message).


More...

ADVERTISEMENT


ADVERTISEMENT


Comments and Discussions!



ADVERTISEMENT

ADVERTISEMENT

ADVERTISEMENT

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT

Languages: » C » C++ » C++ STL » Java » Data Structure » C#.Net » Android » Kotlin » SQL
Web Technologies: » PHP » Python » JavaScript » CSS » Ajax » Node.js » Web programming/HTML
Solved programs: » C » C++ » DS » Java » C#
Aptitude que. & ans.: » C » C++ » Java » DBMS
Interview que. & ans.: » C » Embedded C » Java » SEO » HR
CS Subjects: » CS Basics » O.S. » Networks » DBMS » Embedded Systems » Cloud Computing
» Machine learning » CS Organizations » Linux » DOS
More: » Articles » Puzzles » News/Updates

© https://www.includehelp.com some rights reserved.