A. H = m(n)
B. M = h(n)
C. N = h(m)
D. N = m(h)
Explanation: M is a block of data that is accepted by the hash function. Hash function(H) accepts the input and hash function will be performed. N is the fixed length of hash value of the block of input.
A. Apparently random hash values
B. Evenly distributed hash values
C. Apparently random and evenly distributed values
D. Evenly distributed but not apparently random values
Explanation: When a huge set of input blocks are given to a hash function, a good hash function will result in unique random values with no relation between them. At the same all the hash values will be equal that is fixed length.
A. Integrity
B. Authenticity
C. Confidentiality
D. Security
Explanation: Integrity means retrieving the lost data as soon as possible. Hash functions accomplish integrity, because, even one bit is changed in the data, it will result in a change of hash value with high probability.
A. Secured hash function
B. Cryptographic hash function
C. Security hash function
D. Crypt-analysis hash function
Explanation: The cryptographic hash function is an algorithm, which is used in security applications. It is computationally infeasible to attack the algorithm. Because it doesn’t allow the attacker to crack either of its properties, that are collision free property and one-way property.
A. Message authentication
B. Virus detection
C. Digital signatures
D. One-way password file
Explanation: The application “message authentication” is used to obtain the integrity of the message. Sender sends hash value of the message along with message, then receiver performs the same hash function on the message. If both the message digests are same, means, integrity is achieved.
A. Message administration control
B. Message authentication code
C. Message administration code
D. Message authentication control
Explanation: Message authentication code that is key hash function is mostly used in message authentication. This MAC function results a MAC value, by taking the input block of data and secret key. This MAC value is used to check whether data has changed or not.
A. Number of n bit blocks
B. Ith bit of the hash code
C. Ith bit in jth block
D. Xor operation
Explanation: “m” is the number of n-bit blocks in the input, bij is the ith bit in the jth block, ci is the ith bit of the hash code. Operation between the bits is exclusive OR and this operation is performed on every input block.
A. When x < y
B. When x > y
C. When x = y
D. When x != y
Explanation: Hash function’s primary objective is to provide integrity. No two inputs should have the same hash value, which causes the collision. Collisions are undesirable in hash functions.
A. 2b-n
B. 2b+n
C. 2b/n
D. 2n/b
Explanation: In the hash value h = H(x), x is the preimage of the hash value. 2b-n formula finds the total number of possible collisions for a hash value. Here b > n and 2b is the total number of possible messages, 2n is the total number of possible hash values.
A. Variable input size
B. Fixed output size
C. Efficiency
D. Preimage resistant
Explanation: Hash function will produce fixed lengths of outputs and accepts any size of blocks as input. It is efficient to calculate. If these three requirements need to be met to implement hash function in practical applications.