Hash Functions — Test 1
Page 1 of 2
Question 1
Which of the following equation is correct in case of hash function, where M = input, N = hash value, H = hash function?
0
System Administrator 2026
Question 2
What is/are the property(s) of a good hash function in case of producing outputs for set of inputs?
0
System Administrator 2026
Question 3
What is the core objective of the hash functions in producing hash values?
0
System Administrator 2026
Question 4
What is the name for hash functions that are used in security applications?
0
System Administrator 2026
Question 5
Which of the following application in which hash function is employed, refers hash value as message digest?
0
System Administrator 2026
Question 6
What is the other name for key hash function, which is used in message authentication?
0
System Administrator 2026
Question 7
What is Ci in the bit-by-bit XOR hash function, that is Ci = bi1 + bi2.….. + bim
0
System Administrator 2026
Question 8
When can we detect a collision if the hash values are same for two inputs, that is H(x) = H(y)?
0
System Administrator 2026
Question 9
What is the formula for pre-images of a given hash value, where data block length = b bits and hash code = n bits?
0
System Administrator 2026
Question 10
Which of the following is not a basic property for employing hash function in practical applications?
0
System Administrator 2026