A. Efficiency
B. Preimage resistant
C. Second preimage resistant
D. Collision resistant
Explanation: Hash function is referred as weak, when it only satisfies the Efficiency, preimage resistant, second image resistant, fixed length output, variable length input. It is referred as strong if it satisfies the collision resistant along with all of the above.
A. True
B. False
C.
D.
Explanation: The attacks that are on hash functions are brute force attack and crypt-analysis. Brute force attack mainly concentrates on the bit length of the hash function, whereas crypt-analysis concentrates on cryptographic algorithms.