Data Integrity Algorithms Questions and Answers – Hash Functions and Its Applications

This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “Hash Functions and Its Applications”.

1. When a hash function is used to provide message authentication, the hash function value is referred to as
a) Message Field
b) Message Digest
c) Message Score
d) Message Leap
View Answer

Answer: b
Explanation: A hash function providing message authentication is referred to as massage digest.

2. Message authentication code is also known as
a) key code
b) hash code
c) keyed hash function
d) message key hash function
View Answer

Answer: c
Explanation: Message authentication code is also known as keyed hash function.

3. The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.
a) True
b) False
View Answer

Answer: b
Explanation: The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s private key.
advertisement
advertisement

4. Case b ( refer Figure 1 From The chapter Message Authentication Codes in William Stallings )is an example of digital signature.
a) True
b) False
View Answer

Answer: a
Explanation: Yes, case b is an example of digital signature as the hash value of the message is encrypted with a user’s private key.

5. What is a one-way password file?
a) A scheme in which the password is jumbled and stored
b) A scheme in which the password is XOR with a key and stored
c) A scheme in which the hash of the password is stored
d) A scheme in which the password is passed through a PRF, which is then stored
View Answer

Answer: c
Explanation: A scheme in which the hash of the password is stored by an operating system rather than the password itself is the one-way password file system.

6. Which one of the following is not an application hash functions?
a) One-way password file
b) Key wrapping
c) Virus Detection
d) Intrusion detection
View Answer

Answer: b
Explanation: Key wrapping is a separate algorithm and not an application of hash fuctions.

7. If the compression function is collision resistant, then so is the resultant iterated hash function.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. The problem of designing a secure hash function reduces to that of designing a collision resistant compression function.
advertisement

8. A larger hash code cannot be decomposed into independent subcodes.
a) True
b) False
View Answer

Answer: b
Explanation: Hash codes can be decomposed into independent subcodes and this was the logic behind the meet in the middle attack.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

advertisement

To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.