Cryptographic Hash Functions
Cryptographic Hash Functions
Stallings
TRUE OR FALSE
T F 2. A good hash function has the property that the results of applying
the function to a large set of inputs will produce outputs that are
evenly distributed and apparently random.
T F 12. It can be shown that some form of birthday attack will succeed
against any hash scheme involving the use of cipher block
chaining without a secret key, provided that either the resulting
hash code is small enough or that a larger hash code can be
decomposed into independent subcodes.
Cryptography and Network Security: Principles and Practice, 6 th Edition, by William
Stallings
T F 13. The most widely used hash function has been the Whirlpool.
T F 15. The SHA-512 algorithm has the property that every bit of the hash
code is a function of every bit of the input.
MULTIPLE CHOICE
3. The Secure Hash Algorithm design closely models, and is based on, the hash
function __________ .
A. DES B. MDF
C. SHA D. MAC
8. __________ are measures of the number of potential collisions for a given hash
value.
A. MACs B. Primitives
9. A hash function that satisfies the properties of variable input size, fixed
output size, efficiency, preimage resistant and second preimage resistant is
referred to as a __________.
11. An ideal hash algorithm will require a cryptanalytic effort __________ the brute-
Cryptography and Network Security: Principles and Practice, 6 th Edition, by William
Stallings
force effort.
A. ITIL B. IEEE
C. ISO D. NIST
A. 224 B. 160
C. 384 D. 256
14. "Given a hash function H, with n possible outputs and a specific value H(x), if
H is applied to k random inputs, what must be the value of k so that the
probability that at least one input y satisfies H(y) = H(x) is 0.5?" is a reference
to the __________ .
15. Three new versions of SHA with hash value lengths of 256, 384, and 512 bits
are collectively known as __________ .
A. SHA-3 B. SHA-1
C. SHA-2 D. SHA-0
SHORT ANSWER
Cryptography and Network Security: Principles and Practice, 6 th Edition, by William
Stallings
1. The compression function used in secure hash algorithms falls into one of
two categories: a function specifically designed for the hash function or an
algorithm based on a ___________ symmetric block cipher.
5. The most important and widely used family of cryptographic hash functions
is the __________ SHA family.
8. A hash function that satisfies the properties of variable input size, fixed
output size, efficiency, preimage resistant, second preimage resistant and
__________ collision resistant is referred to as a strong hash function.
10. If collision resistance is required the value _________ 2m/2 determines the
strength of the hash code against brute-force attacks.
12. SHA-1 is very similiar in structure and in the basic mathematical operations
used to __________ MD5 and SHA-0.
13. The evaluation criteria for SHA-3 are security, ___________ cost, and algorithm
and implementation characteristics.
15. The hash value of a message in the __________ digital signature application is
encrypted with a user's private key.