1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A hash function is a mathematical algorithm that maps data of arbitrary size to a fixed-size hash value, typically represented as a short string of characters. The hash function result, also known as a digest or checksum, provides a unique representation of the original data input. The functionality of hash functions relies on the fact that if there is any change to the data after the original hash was generated, the new hash value calculated after content modification will be different from the original result because hash functions are designed to be sensitive to changes in the input data.
True
Hash functions find use in a variety of applications, including:
Cryptography
Data integrity verification
Password verification and storage
Digital signatures
Blockchain technology
Which of the answers listed below refers to a cryptographic hash function that has been widely used in the past but is now considered deprecated for security-sensitive applications due to known vulnerabilities?
MD5
Which of the following answers refers to a family of cryptographic hash functions designed for various security-related applications, including digital signatures, password storage, secure communications, and data integrity verification?
SHA (Secure Hash Algorithms)
Which of the hash functions listed below offers the highest level of security?
SHA-3
Which of the following combines a cryptographic hash function with a secret key to provide a means of verifying both the authenticity and integrity of a message or data?
HMAC (Hash-based Message Authentication Code)
Which of the answers listed below refers to a non-cryptographic hash function often used for error-checking purposes?
CRC