Semi Mod 2 Flashcards

(44 cards)

1
Q

First message block becomes an input to the second hast operation

A

Avalanche effect of hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Different hash values for two messages

A

Avalanche effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is a process for using the hash function

A

Hashing algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Schematic of hashing algorithm illustration

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a hash function is collision resistant then it is?

A

second pre-image resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This property makes it very difficult for an attacker to find two input values

A

Collision resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Collision resistance is also called?

A

Collision free hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This property means it should be hard to find two different inputs

A

Collision resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This property means it’s should be hard to find a different input with the same hash

A

Second pre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This property protects against attacker who has an input value and its hash

A

Second pre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This property means it should be computationally hard to reverse

A

Pre-image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This property protects against an attacker who only has a hash value

A

Pre-image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the properties of hash function

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Converts data of arbitary length

A

Hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hash function converts data to arbitrary length to a fixed length this process is called?

A

Hashing the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The hash is much smaller than the input data; hence hash functions are sometimes called?

A

Compression function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hash is a smaller representation of larger data it is also referred to as?

A

Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hash function with n bit output is called?

A

N-bit hash function

19
Q

Features of hash function

20
Q

Most common application of hash function

A

data integrity check

21
Q

Used to generate checksums on data files

A

Data integrity check

22
Q

Consist of table pairs

A

Password file

23
Q

Applications of hash function

A

Passwords storage
Data integrity check

24
Q

Three versions of whirlpool

25
Whirlpool is derived from the modified version of?
AES
26
One of the designers of whirlpool
Vincent rijmen
27
This is a 512-bit hash function
Whirlpool
28
Improved version of ripemd and most widely used version in the fam
RIPEMD-160
29
Based upon the design principles used in md4
RIPEMD-128
30
3 Sets of RIPEMD
31
Ripemd was design by open research community known as family of?
European hash function
32
Ripemd acronym
33
Family of sha consist of
Sha-0123
34
Sha 0 how many bit
35
Sha-0 was published by? In what year
NIST 1993
36
Most widely used of the existing sha
Sha-1
37
Sha 1 iş employed in used applications like?
SSL
38
SHA 2 FAMILY
39
NEW SHA 3
40
Was popular and widely used hash function
Md5
41
Md family consists of?
42
md was adopted by?
Internet standard rfc 1321
43
How many bit in md 5
128
44
What are the Popular hash functions