Cryptography Hash Functions Online Exam Quiz
Cryptography Hash Functions GK Quiz. Question and Answers related to Cryptography Hash Functions. MCQ (Multiple Choice Questions with answers about Cryptography Hash Functions
What is a one-way password file?
Options
A : A scheme in which the password is jumbled and stored
B : A scheme in which the password is XOR with a key and stored
C : A scheme in which the hash of the password is stored
D : A scheme in which the password is passed through a PRF, which is then stored
Message authentication code is also known as
Options
A : key code
B : hash code
C : keyed hash function
D : message key hash function
When a hash function is used to provide message authentication, the hash function value is referred to as
Options
A : Message Field
B : Message Digest
C : Message Score
D : Message Leap
Which one of the following is not an application hash functions?
Options
A : One-way password file
B : Key wrapping
C : Virus Detection
D : Intrusion detection
Case b ( refer Figure 1 From The chapter Message Authentication Codes in William Stallings )is an example of digital signature.
Options
A : True
B : False
C :
D :
If the compression function is collision resistant, then so is the resultant iterated hash function.
Options
A : True
B : False
C :
D :
A larger hash code cannot be decomposed into independent subcodes.
Options
A : True
B : False
C :
D :
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.
Options
A : True
B : False
C :
D :
Cryptography Authenticated Encryption Ccm Gcm I more Online Exam Quiz
Cryptography Elliptic Curve Arithmetic Cryptography I
Cryptography Groups Rings Fields
Cryptography Hash Functions Cbc
Cryptography Interview Experienced