0% found this document useful (0 votes)
7 views2 pages

Part A Questions

The document discusses various aspects of cryptographic concepts, including one-way hash functions, digital signatures, and hash function requirements. It highlights the properties of digital signatures, compares SHA and MD5 in terms of security, and explains the need for public key cryptosystems. Additionally, it differentiates between Message Authentication Codes and hash functions, and lists applications of cryptographic hash functions.

Uploaded by

uthaya shangar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views2 pages

Part A Questions

The document discusses various aspects of cryptographic concepts, including one-way hash functions, digital signatures, and hash function requirements. It highlights the properties of digital signatures, compares SHA and MD5 in terms of security, and explains the need for public key cryptosystems. Additionally, it differentiates between Message Authentication Codes and hash functions, and lists applications of cryptographic hash functions.

Uploaded by

uthaya shangar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

UNIT 3

1. Mention the use of one-way property in hash function. 2023(Jan)

Since their development, one-way hash functions have been used more often in
encryption. People can use hashing to encrypt and decrypt digital signatures. The digital
signature is transformed into a hash value and sent to the receiver.

2. List the properties of digital signature. 2023(Jan)

Properties of digital signatures

i. Unforgeable.
ii. Authentic.
iii. Can't be modified once sent.
iv. Not reusable.
v. Prevent repudiation.

3. List the requirements of HASH Function. 2022 (Jan)

Hash Function Requirements


 H can be applied to a block of data of any size.
 H produces a fixed length output.
 H(x) is relatively easy to compute.
 For any given code h, it is computationally infeasible to find x such that H(x) = h.
 For any given block x, it is computationally infeasible to find y  x with H(y) = H(x)

4. How SHA is more Secure than MD5. 2022 (Jan)

To conclude, MD5 generates a message digest of 128-bits, while SHA1 generates a


message digest of 160-bit hash value. Hence, SHA1 is a relatively complex algorithm and
provides better security than MD5.

5. Emerging the need of Public Key Cryptosystem. 2021(Mar)

Encryption and decryption, which allow two communicating parties to disguise data that
they send to each other. The sender encrypts, or scrambles, the data before sending it. The
receiver decrypts, or unscrambles, the data after receiving it.
6. Differentiate Message Authentication Code and Hash function. 2021(Mar)

A message authentication code (MAC) is similar to a cryptographic hash, except that it is


based on a secret key. When secret key information is included with the data that is
processed by a cryptographic hash function, the resulting hash is known as an HMAC.

7. Mention the applications of cryptographic hash functions. 2019(Nov)

Some of these applications are listed below


 Message Digest.
 Password Verification.
 Data Structures(Programming Languages)
 Compiler Operation.
 Rabin-Karp Algorithm.
 Linking File name and path together.
 Game Boards.
 Graphics.

8. Define digital signature.2019 (Nov)

A digital signature is a specific type of electronic signature (e-signature) that


relies on public-key cryptography to support identity authentication and provide
data and transaction integrity.

You might also like