Hashing Algorithms in Data Security
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary characteristic of a Hashing algorithm?

  • It is a function that can only be used for encryption.
  • It is a function that can only be used for decryption.
  • It is a one-way function. (correct)
  • It is a two-way function.
  • What is the output size of a SHA-1 hash algorithm?

  • 128-bit
  • 190-bit
  • 256-bit
  • 160-bit (correct)
  • What is the main difference between Encryption and Hashing?

  • Encryption is a one-way function, while Hashing is a two-way function.
  • Encryption is a two-way function, while Hashing is a one-way function. (correct)
  • Encryption is used for digital signatures, while Hashing is used for password storage.
  • Encryption is used for password storage, while Hashing is used for digital signatures.
  • What is the purpose of using a salted hash?

    <p>To make the hash more secure against brute-force attacks.</p> Signup and view all the answers

    What is the main limitation of the MD5 algorithm?

    <p>It is vulnerable to collisions and can be reversed in a fraction of a second.</p> Signup and view all the answers

    What is the primary purpose of a Hashing algorithm in password storage?

    <p>To store the password in a secure, fixed-length format.</p> Signup and view all the answers

    What is the primary purpose of a cryptographic salt in a hashing process?

    <p>To eliminate the possibility of precomputed lookup tables</p> Signup and view all the answers

    What type of algorithm is SHA-256?

    <p>Secure Hash Algorithm</p> Signup and view all the answers

    What is the main concern with using hash algorithms without salts?

    <p>They are vulnerable to precomputed attacks</p> Signup and view all the answers

    What is the purpose of a rainbow table in password cracking?

    <p>To store a map between hashes and passwords</p> Signup and view all the answers

    What is the characteristic of a cryptographic hash function?

    <p>It is irreversible</p> Signup and view all the answers

    What is the benefit of using a large salt value in hashing?

    <p>It makes it difficult to use precomputed lookup tables</p> Signup and view all the answers

    What is the default hashing algorithm used by PASSWORD_DEFAULT as of PHP 5.5.0?

    <p>bcrypt</p> Signup and view all the answers

    What is the purpose of the password_verify() function in PHP?

    <p>To check if the input password is correct or incorrect</p> Signup and view all the answers

    What is the length of the result from using the PASSWORD_BCRYPT algorithm?

    <p>60 characters</p> Signup and view all the answers

    What is the advantage of using the password_hash() function in PHP?

    <p>It is the easiest and most secure approach</p> Signup and view all the answers

    What is the purpose of the Argon2i and Argon2id algorithms in PHP?

    <p>To hash passwords securely</p> Signup and view all the answers

    What is the characteristic of the hash produced by the password_hash() function in PHP?

    <p>It is a one-way encryption</p> Signup and view all the answers

    More Like This

    Image Details Entry
    18 questions

    Image Details Entry

    LongLastingEvergreenForest avatar
    LongLastingEvergreenForest
    COS 212 Hashing and Searching Algorithms
    10 questions
    Internet Security - Hashing Algorithms
    29 questions
    Cryptography and Hashing Algorithms
    63 questions
    Use Quizgecko on...
    Browser
    Browser