Professional Documents
Culture Documents
Functions_Quiz
* This form will record your name, please fill your name.
1. Which of the following security services is/are offered by the hash functions
Non repudiation
Data Integrity
Pre-Image Resistance
Collision resistant
5/19/2021
3. Which of the following statements is INCORRECT according to the Hash functions
The hash functions work on arbitrary length input but produces fixed length output.
Using the Hash functions, the applications can be achieved all security services
4. Which of the following names can we use for denoting the output of the hash function?
Hash value
Hash Code
Message Digest
5. Given the following input (1201, 2101, 2021, 2002, 2010, 2005, 2020) and the hash
function:
x MOD 10
Which of the following statements are TRUE
5/19/2021
6. Let h be a cryptographic hash function, then which the following statements is/are
TRUE
(1) For any given hash value y, it is computationally infeasible to find x such that y =
h(x)
(2) For any given x, it is computationally infeasible to find x1 ≠ x such that h(x1) =
h(x)
7. SHA-512 takes an input message with a maximum length of less than ___ bits and
produces an output of message digest of ____ bits
2128 , 512
264 ,160
2128 , 256
264 , 512
512
128
160
256
5/19/2021
9. Hash-baseded Message Authentication Code HMAC
10. Hash function is a function which usually takes an arbitrary size of data and
computes a ciphertext
Only (1)
Only (2)
None of them
Both of them
5/19/2021
12. When padding in MD5 is done, the length L of the message satisfies
This content is neither created nor endorsed by Microsoft. The data you submit will be sent to the form owner.
Microsoft Forms
5/19/2021