Home »
Cryptography »
Cryptography MCQs
MCQ | Hash Function Technique
Here, we have a set of multiple-choice questions and answers (quiz) on Hash Function Technique.
Submitted by Monika Sharma, on March 23, 2020
Hash Function Technique MCQs
1) Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
- 1024
- 512
- 256
- 1248
Answer: a. 1024
Explanation:
As we study, the message is divided into blocks of size 1024 bits, and the output produced is a 512-bit message digest and uses the 512-bit buffer till 80 rounds.
2) When a hash function is used to provide message authentication, the hash function value is called to as:
- Message Field
- Message Digest
- Message Score
- Message Leap
Answer: b. Message Digest
Explanation:
We know that the hash function providing message authentication is referred to as massage digest in cryptography.
3) Which of the following are used to create a message digest by the network security protocols?
- RSA
- SHA-1
- DES
- MD5
Answer: b. and c. SHA-1 and MD5
Explanation:
- RSA: Basically, it is an algorithm used to encrypt and decrypt messages.
- SHA 1: Secure Hash Algorithm 1 is a cryptographic hash function in cryptography. It produces a 160 bit (20 bytes) hash value in cryptography.
- DES: Data Encryption Standard is a symmetric key algorithm for encryption of electronic data in cryptography.
- MD5: It is a widely used cryptographic hash function that produces a 128-bit hash value in cryptography.
4) What is the output of the N 1024-bit blocks from the Nth stage in this?
- 512 bits
- 1024 bits
- N x 1024bits
- N x 512 bits
Answer: a. 512 bits
Explanation:
We know that when we use SHA 512 we take 1024 bit plaintext into this algorithm and get the output as 512 bit which is fixed.
5) What is the output of a cryptographic hash function means?
- A variable set of bits
- A fixed set of bits, derived from one-way mathematical operations
- An output which may be easily discovered by an adversary
- Outputs of such functions are of no importance
Answer: b. A fixed set of bits, derived from one-way mathematical operations
Explanation:
The output of a cryptographic hash function means as a fixed set of bits, derived from one-way mathematical operations.
6) A hash function is a _____ that converts a numerical input value into another compressed numerical value.
- Abstract view
- Mathematical function
- Both A and B
- None of the mentioned above
Answer: b. Mathematical function
Explanation:
A hash function is a mathematical function that turns a numerical input value into another numerical input value that has been compressed. When using the hash function, the input can be of any length, but the result is always of a set length.
7) A cryptographic hash function must be deterministic,
- True
- False
Answer: a. True
Explanation:
Determinism is required in a cryptographic hash function, which means that the same message must always result in the same hash value. The hash value for any given message can be computed in a short amount of time. It is not possible to generate a message that contains the hash value of a given value. It is impossible to find two different messages that have the same hash value in the same manner.
8) _____ and encryption is two separate cryptographic processes.
- Hashing
- Decryption
- Processing
- None of the mentioned above
Answer: a. Hashing
Explanation:
The cryptographic methods of hashing and encryption are distinct from one another. A cryptographic hash function, on the other hand, is distinct. Because hashing is a one-way process, after we've hashed data, we won't be able to restore it to its original format.
9) Amongst which of the following is /are good for Hashes,
- Password protection
- Data integrity / file verification
- Digital signatures and virus signatures
- All of the mentioned above
Answer: d. All of the mentioned above
Explanation:
Despite the fact that hashing is not encryption, it is a type of cryptography that can be used for a variety of purposes, including password protection, data integrity / file verification, digital signatures, and virus identification.
10) Digital Signatures authenticates the sender by appending the original message with the ____ digest.
- Decrypted message
- Encrypted message
- Systematic approach
- None of the mentioned above
Answer: b. Encrypted message
Explanation:
A digital signature verifies the identity of the sender by attaching the original message together with the encrypted message digest to the end of the message. The sender encrypts the message using the private key in order to assure nonrepudiation, while the hash safeguards against data tampering and ensures integrity, as shown in the equation: digital signature=private sender's key (hash (message).
More...