Hash Functions and Its Applications
Question Description
I’m working on a cyber security question and need an explanation and answer to help me learn.
Unformatted Attachment Preview
1. When a hash function is used to provide message authentication, the hash function value is
referred to as
a) Message Field
b) Message Digest
c) Message Score
d) Message Leap
2. Message authentication code is also known as
a) key code
b) hash code
c) keyed hash function
d) message key hash function
3. The main difference in MACs and digital signatures is that, in digital signatures the hash
value of the message is encrypted with a useràpublic key.
a) True
b) False
4. Case b ( refer Figure 1 From The chapter Message Authentication Codes in William
Stallings )is an example of digital signature.
a) True
b) False
5. What is a one-way password file?
a) A scheme in which the password is jumbled and stored
b) A scheme in which the password is XOR with a key and stored
c) A scheme in which the hash of the password is stored
d) A scheme in which the password is passed through a PRF, which is then stored
6. Which one of the following is not an application hash functions?
a) One-way password file
b) Key wrapping
c) Virus Detection
d) Intrusion detection
7. If the compression function is collision resistant, then so is the resultant iterated hash
function.
a) True
b) False
8. A larger hash code cannot be decomposed into independent subcodes.
a) True
b) False
Purchase answer to see full
attachment
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."