COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted. A block cipher works on a single character at a time, and is faster than a stream cipher.
Detailed explanation-2: -Design of Hashing Algorithms This hash function forms the part of the hashing algorithm. Hashing algorithm involves rounds of above hash function like a block cipher. Each round takes an input of a fixed size, typically a combination of the most recent message block and the output of the last round.
Detailed explanation-3: -Hashing algorithms can be used to authenticate data. The writer uses a hash to secure the document when it’s complete. The hash works a bit like a seal of approval. A recipient can generate a hash and compare it to the original.
Detailed explanation-4: -There are several common cryptographic hash algorithms, including Message Digest 5 (MD5) and Secure Hash Algorithm 1 (SHA-1). MD5 outputs a 128-bit digest, and SHA-1 outputs a 160-bit digest. Weaknesses of MD5 have been known for some time, which led to recommendations to shift from MD5 to SHA-1.
Detailed explanation-5: -Technically, hashing can be reversed, but the computational power needed to decrypt it makes decryption infeasible. The way hashing works is with a hashing algorithm.