You are on page 1of 5

Cryptography_Lecture10: Hash

Functions_Quiz

* This form will record your name, please fill your name.

1. Which of the following security services is/are offered by the hash functions

Authentication data compression application using hash function

Non repudiation

Data Integrity

All of the above

2. Which of the following properties does not belong to Hash functions

Pre-Image Resistance

Variable input size

Fixed output size

Collision resistant

None of the above

5/19/2021
3. Which of the following statements is INCORRECT according to the Hash functions

They compress the input values

The hash functions work on arbitrary length input but produces fixed length output.

Hash Functions are mathematical functions

Using the Hash functions, the applications can be achieved all security services

4. Which of the following names can we use for denoting the output of the hash function?

Hash value

Hash Code

Message Digest

All of the above

5. Given the following input (1201, 2101, 2021, 2002, 2010, 2005, 2020) and the hash
function:
x MOD 10
Which of the following statements are TRUE

1201, 2101, and 2021 hash to the same value 

2020, and 2010 hash to the same value

All elements hash to the same value

Each elements hashes to a different value

5/19/2021
6. Let h be a cryptographic hash function, then which the following statements is/are
TRUE
(1) For any given hash value y, it is computationally infeasible to find x such that y =
h(x)
(2) For any given x, it is computationally infeasible to find x1 ≠ x such that h(x1) =
h(x)

Both (1) and (2) are true

Only (2) is true

Only (1) is true

Both (1) and (2) are false

7. SHA-512 takes an input message with a maximum length of less than ___ bits and
produces an output of message digest of ____ bits

2128 , 512
264 ,160
2128 , 256
264 , 512

8. The input block size of MD5 family is of ___ bits

512

128

160

256

5/19/2021
9. Hash-baseded Message Authentication Code HMAC

generates small block of data

generates large block of data

does not generate data

is used for Digital signatures

10. Hash function is a function which usually takes an arbitrary size of data and

creates a small and flexible size of data

creates a small and fixed size of data

creates a permutation on input data

computes a ciphertext

11. What is the difference between MAC and HMAC


(1) They are the same
(2) MAC is a tag or a piece of information that helps to authenticate a message while
HMAC is a special type of MAC with a cryptographic hash function and a secret
cryptographic key.
Which one is CORRECT?

Only (1)

Only (2)

None of them

Both of them

5/19/2021
12. When padding in MD5 is done, the length L of the message satisfies

L = 446 mod 512

L = 324 mod 512

L = 448 mod 512

L = 896 mod 512

L = 128 mod 512

This content is neither created nor endorsed by Microsoft. The data you submit will be sent to the form owner.

Microsoft Forms

5/19/2021

You might also like