Assignment ETH 7 SOL 2024
Assignment ETH 7 SOL 2024
QUESTION 1:
Consider a hash function H that generates hash values h1 and h2, when fed with messages m1
and m2 respectively. Which of the following options can never be true?
a. h1 and h2 are equal, but m1 and m2 are unequal.
b. m1 and m2 are equal, but h1 and h2 are unequal.
c. None of these.
Correct Answer: b
Detail Solution: A hash function maps a given message m to generate some particular hash
value h. Two different messages m1 and m2 can, however, generate the same hash value,
which is called collision. The same message always generates the same hash value.
The correct option is (b).
______________________________________________________________________________
QUESTION 2:
What is meant by collision in the context of hashing?
a. More than one different messages can generate the same hash value.
b. After encryption, the ciphertexts corresponding to two or more plaintexts are
the same.
c. The hash function generates the all zero string as the hash value.
d. None of these.
Correct Answer: a
Detail Solution: In a hash function, collision refers to the situation where more than one
different messages generate the same hash value. It has nothing to do with encryption.
The correct option is (a).
______________________________________________________________________________
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 3:
Which of the following does not correspond to the first preimage resistance in the context of
hash functions?
a. It is difficult to find a message M such that HASH(M) = H, except for a few hash
values H.
b. Given a message M1, it is difficult to find another message M2 such that
HASH(M1) = HASH(M2).
c. It is difficult to find two messages M1 and M2 such that HASH(M1) and
HASH(M2) and unequal.
d. None of these.
Correct Answer: b, c
Detail Solution: This follows from the definition of the desirable properties of a hash function.
First preimage resistance refers to the condition that we are given a hash value H, and are
trying to find out some message M such that HASH(M) = H. This should be difficult to do.
The correct options are (b) and (c).
______________________________________________________________________________
QUESTION 4:
Which of the following is/are false for Unkeyed hash function (Modification Detection Code)?
a. Unkeyed hash function is used to preserve integrity of message.
b. Unkeyed hash function is used to authenticate source of message.
c. Unkeyed hash function produces an output that depends only on the input data.
d. None of these.
Correct Answer: b
Detail Solution: Unkeyed hash function takes an input of variable length and converts it to a
fixed-length output. It does not use any key, and thus the output only depends on the input
data. Unkeyed hash function is used to preserve data integrity. It is impossible to figure out the
sender of the message when we use Unkeyed hash function.
Thus the correct option is (b).
______________________________________________________________________________
QUESTION 5:
Which of the following statement(s) is/are true?
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Correct Answer: b, c
Detail Solution: A hash function by definition realizes a many-to-one mapping, where more
than one messages can get mapped to the same hash value. In contrast, encryption realizes a
one-to-one function, where a given plaintext maps to a unique ciphertext, and vice versa.
The correct options are (b) and (c).
______________________________________________________________________________
QUESTION 6:
Which of the following are hash functions?
a. MD5
b. Triple-DES
c. SHA-1
d. AES
Correct Answer: a, c
Detail Solution: MD5 and SHA-1 are examples of hash function, while Triple-DES and AES are
examples of symmetric key encryption algorithm.
The correct options are (a) and (c).
______________________________________________________________________________
QUESTION 7:
Hash functions are slower as compared to symmetric and public key encryption.
a. True
b. False
Correct Answer: b
QUESTION 8:
What are the block size and key size of the DES algorithm?
a. 64 bits, 56 bits
b. 56 bits, 64 bits
c. 64 bits, 64 bits
d. 64 bits, 128 bits
Correct Answer: a
Detail Solution: In the DES algorithm, the block size is 64 bits and the key size is 56 bits.
The correct option is (a).
_____________________________________________________________________________
QUESTION 9:
Which of the following is/are true for digital signature?
a. Digital signature is legally equivalent to hand-written signature.
b. In digital signature, signer uses his public key to sign.
c. Anybody having access to the signer’s public key can verify the signature.
d. None of these.
Correct Answer: a, c
Detail Solution: Digital signature is an example of authentication where the signer uses his
private key to sign any document, a receiver or anybody having the access of public key of the
signer can verify the signature, digital signature is equivalent to hand written signature.
The correct options are (a) an (c).
____________________________________________________________________________
QUESTION 10:
The SSL record protocol is responsible for
a. High-speed data transmission
b. Data authentication
c. Non repudiation
d. None of these
Correct Answer: d
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Detail Solution: The SSL Record protocol uses a combination of various cryptographic
techniques to provide secure data transmission over a network. It ensures data encryption and
also data integrity (using a hash function). However, it does not provide authentication service
or non-repudiation guarantee.
The correct option is (d).
______________________________________________________________________________
************END*******