0% found this document useful (0 votes)
33 views1 page

Assignment 5 SSM

Uploaded by

Vishal Jadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views1 page

Assignment 5 SSM

Uploaded by

Vishal Jadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

GOVERNMENT ENGINEERING COLLEGE, BHAVNAGAR

DEPARTMENT OF COMPUTER ENGINEERING

Assignment# 5

Name of Subject: INS (2170709) Name of Faculty: Prof. S.S.Machchhar

Date on G-Classroom: 01/10/2024 Branch: Computer Engg.


Date of Submission: 15/10/2024 Semester: 7
Name of Topic: Hash functions

Level as per
Sr. No. Question
Bloom’s Taxonomy
1 Discuss Hash function and its requirements. Also explain Understanding
its limitation
Differentiate between hashing and encryption. What are the
2 Understanding
practical applications of hashing (atleast three)?
Explain working of Cipher-based Message Authentication
3 Understanding
Code and Data Authentication Algorithm.
Compare and contrast – MAC VS Encryption functions. In
MAC, if 80-bit key is used and the tag is 32 bits, then after
4 Application
how many rounds attacker will produce a key, which must be
the one used by the sender ?
Write the algorithm for message authentication code based on
5 HASH functions. Also discuss its efficient implementation Understanding
approach.
What is block size and message digest size in SHA 512?
6 With the help of diagram explain a round of SHA-512 Understanding
algorithm
Explain the following properties of hash function
7 (i) One way property Understanding
(ii) Weak collision resistance
Illustrate variety of ways in which MAC code can be used to
8 Application
provide Message authentication.
What is message authentication code? What is the difference
9 between a Message authentication code and a one-way hash Understanding
function? Write the basic uses of Message authentication code.
EXPLAIN MAC WITH EXAMPLE AND HASH FUNCTIONS
10 Evaluting
WITH EXAMPLE

Level Remembering Understanding Application Analyzing Evaluting Evaluation


Weightage 0% 70% 20% 0% 10% 0%

Prof. S. S. Machchhar Head of Department,


Subject In-Charge Computer Engineering,
Computer Engineering, GEC, Bhavnagar
GEC, Bhavnagar

You might also like