Hash Functions: Requirements and Properties

QuaintSynecdoche avatar
QuaintSynecdoche
·
·
Download

Start Quiz

Study Flashcards

18 Questions

A ______ can use a keyed hash in various ways with a message, often to create a digital signature.

MAC

A MAC is a cryptographic ______ that condenses a variable-length message to a fixed-sized authenticator.

checksum

A digital signature provides a way to ensure the ______ of a message, in addition to its authenticity.

integrity

Using a ______ cipher in chaining mode can be used to create a MAC, where the final block is used as the MAC.

symmetric

A hash function should have a ______ property, meaning it is infeasible to find x such that H(x) = h given h.

one-way

Message authentication is concerned with validating the identity of the ______ of a message.

originator

The ______ effect is a desirable property of cryptographic hash functions, where a small change in the input leads to a significant change in the output.

avalanche

In a keyed hash function, the ______ is used to condense the message and verify its authenticity.

key

If symmetric encryption is used, the receiver knows the sender must have created it because only the sender and receiver know the ______ used.

key

The Data Authentication Algorithm (DAA) is a MAC based on ______ in CBC mode.

DESCBC

Block ______ can be used as hash functions, but the resulting hash value is too small and susceptible to attacks.

ciphers

The ______ algorithm was originally designed by NIST & NSA in 1993 and was revised in 1995 as SHA-1, a US standard for use with DSA signature scheme.

Secure Hash

A digital signature provides ______ and authentication, whereas a MAC only provides authentication.

non-repudiation

A Message Authentication Code (MAC) is generated by an algorithm that creates a small fixed-sized block depending on both the message and some ______.

key

In public-key encryption, if the sender signs the message using their ______ and then encrypts with the recipient's public key, it provides both secrecy and authentication.

private-key

When selecting a cryptographic hash algorithm, it is important to consider the ______ of the hash function to ensure security.

security

It is generally regarded as better to compute the MAC ______ encryption.

before

A MAC provides assurance that the message is unaltered and comes from the ______.

sender

This quiz covers the fundamentals of hash functions, including their requirements and properties. Learn about the importance of hash functions in cryptography and their applications in digital signatures. Test your knowledge on hash functions and their attributes.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Cryptographic Hash Functions and Keyed Hashing Quiz
5 questions
SHA-3 Hash Function
29 questions
Hash Functions in Computer Science
24 questions

Hash Functions in Computer Science

PrincipledForeshadowing avatar
PrincipledForeshadowing
Use Quizgecko on...
Browser
Browser