Computer Networks » Hash Functions
What is/are the property(s) of a good hash function in case of producing outputs for set of inputs?
A. Apparently random hash values
B. Evenly distributed hash values
C. Apparently random and evenly distributed values
D. Evenly distributed but not apparently random values
Read more about this MCQ
What is the name for hash functions that are used in security applications?
A. Secured hash function
B. Cryptographic hash function
C. Security hash function
D. Crypt-analysis hash function
Read more about this MCQ
Which of the following application in which hash function is employed, refers hash value as message digest?
A. Message authentication
B. Virus detection
C. Digital signatures
D. One-way password file
Read more about this MCQ
What is the other name for key hash function, which is used in message authentication?
A. Message administration control
B. Message authentication code
C. Message administration code
D. Message authentication control
Read more about this MCQ
What is Ci in the bit-by-bit XOR hash function, that is Ci = bi1 + bi2.….. + bim
A. Number of n bit blocks
B. Ith bit of the hash code
C. Ith bit in jth block
D. Xor operation
Read more about this MCQ