FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
A
Substitution
B
block
C
loop
D
sponge
Explanation: 

Detailed explanation-1: -A sponge function takes as input a string of any length, and returns a string of any requested variable length. . One type of cryptographic algorithm is a one-way hash algorithm.

Detailed explanation-2: -The MD5 (message-digest algorithm) hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.

Detailed explanation-3: -A cryptographic hash algorithm produces a fixed-length output string (often called a digest) from a variable-length input string. For all practical purposes, the following statements are true of a good hash function: Collision resistant: If any portion of the data is modified, a different hash will be generated.

Detailed explanation-4: -Collision attack: A collision attack on a cryptographic hash tries to find two inputs producing the same hash value. The attacker does not have control over the content of the message, but they are arbitrarily chosen by the algorithm.

There is 1 question to complete.