18 Questions
A ______ can use a keyed hash in various ways with a message, often to create a digital signature.
MAC
A MAC is a cryptographic ______ that condenses a variable-length message to a fixed-sized authenticator.
checksum
A digital signature provides a way to ensure the ______ of a message, in addition to its authenticity.
integrity
Using a ______ cipher in chaining mode can be used to create a MAC, where the final block is used as the MAC.
symmetric
A hash function should have a ______ property, meaning it is infeasible to find x such that H(x) = h given h.
one-way
Message authentication is concerned with validating the identity of the ______ of a message.
originator
The ______ effect is a desirable property of cryptographic hash functions, where a small change in the input leads to a significant change in the output.
avalanche
In a keyed hash function, the ______ is used to condense the message and verify its authenticity.
key
If symmetric encryption is used, the receiver knows the sender must have created it because only the sender and receiver know the ______ used.
key
The Data Authentication Algorithm (DAA) is a MAC based on ______ in CBC mode.
DESCBC
Block ______ can be used as hash functions, but the resulting hash value is too small and susceptible to attacks.
ciphers
The ______ algorithm was originally designed by NIST & NSA in 1993 and was revised in 1995 as SHA-1, a US standard for use with DSA signature scheme.
Secure Hash
A digital signature provides ______ and authentication, whereas a MAC only provides authentication.
non-repudiation
A Message Authentication Code (MAC) is generated by an algorithm that creates a small fixed-sized block depending on both the message and some ______.
key
In public-key encryption, if the sender signs the message using their ______ and then encrypts with the recipient's public key, it provides both secrecy and authentication.
private-key
When selecting a cryptographic hash algorithm, it is important to consider the ______ of the hash function to ensure security.
security
It is generally regarded as better to compute the MAC ______ encryption.
before
A MAC provides assurance that the message is unaltered and comes from the ______.
sender
This quiz covers the fundamentals of hash functions, including their requirements and properties. Learn about the importance of hash functions in cryptography and their applications in digital signatures. Test your knowledge on hash functions and their attributes.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free