Understanding Secure Hash Algorithms (SHA)

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following correctly defines the acronym SHA?

  • System Hash Architecture
  • Strong Hash Application
  • Secure Hash Algorithm (correct)
  • Secure Hardware Algorithm

Which organization collaborated to develop the SHA family of hash functions?

  • IBM
  • Microsoft
  • NSA & NIST (correct)
  • Google

What is the output length, in bits, of the SHA-1 hash function?

  • 160-bit (correct)
  • 512-bit
  • 256-bit
  • 128-bit

What primary security flaw led to the deprecation of SHA-1?

<p>Vulnerability to collision attacks (C)</p> Signup and view all the answers

Which specific SHA version is utilized in Bitcoin mining operations?

<p>SHA-2 (SHA-256) (A)</p> Signup and view all the answers

What is the fundamental architectural difference between SHA-1/SHA-2 and SHA-3?

<p>SHA-3 employs the Keccak sponge construction, while SHA-1 &amp; SHA-2 utilize the Merkle-Damgård construction (C)</p> Signup and view all the answers

Which variant within the SHA-2 family generates the longest hash output?

<p>SHA-512 (D)</p> Signup and view all the answers

In what year was SHA-3 officially standardized by NIST?

<p>2015 (D)</p> Signup and view all the answers

Which type of cryptographic attack was a key design consideration in ensuring SHA-3's resistance?

<p>Length extension attack (C)</p> Signup and view all the answers

Flashcards

What does SHA stand for?

Secure Hash Algorithm; a family of cryptographic hash functions.

Who developed SHA?

NSA & NIST; They developed the SHA family of hash functions.

SHA-1 output length?

160-bit is the output length of SHA-1.

Why deprecate SHA-1?

SHA-1 was deprecated due to collision vulnerabilities.

Signup and view all the flashcards

SHA version in Bitcoin?

SHA-2 (SHA-256) is used in Bitcoin mining.

Signup and view all the flashcards

Structural SHA difference?

SHA-3 uses Keccak sponge construction; SHA-1 & SHA-2 use Merkle-Damgård.

Signup and view all the flashcards

SHA-2 longest output?

SHA-512 produces the longest hash output among the SHA-2 variants listed.

Signup and view all the flashcards

SHA-3 standardized?

SHA-3 was officially standardized in 2015.

Signup and view all the flashcards

SHA-3 resistance?

SHA-3 is specifically designed to be resistant to length extension attacks.

Signup and view all the flashcards

Study Notes

  • SHA stands for Secure Hash Algorithm.
  • The SHA family of hash functions was developed by the NSA & NIST.
  • SHA-1 has an output length of 160-bits.
  • SHA-1 was deprecated due to collision vulnerabilities.
  • Bitcoin mining uses SHA-2 (SHA-256).
  • SHA-3 uses Keccak sponge construction, while SHA-1 & SHA-2 employ Merkle-DamgÃ¥rd construction.
  • SHA-2 variant SHA-512 produces the longest hash output.
  • SHA-3 was officially standardized in 2012.
  • SHA-3 is specifically designed to be resistant to length extension attacks.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

SHA-1 Cryptographic Tool
10 questions
SHA Hash Functions
22 questions

SHA Hash Functions

QuaintSynecdoche avatar
QuaintSynecdoche
SHA-1 Hash Function Overview
10 questions

SHA-1 Hash Function Overview

BrilliantFallingAction143 avatar
BrilliantFallingAction143
Use Quizgecko on...
Browser
Browser