COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
field
|
|
digest
|
|
password
|
|
message
|
Detailed explanation-1: -Hash function coverts data of arbitrary length to a fixed length. This process is often referred to as hashing the data. In general, the hash is much smaller than the input data, hence hash functions are sometimes called compression functions.
Detailed explanation-2: -A hash function takes an input string of arbitrary length and produces a fixed-size, short output called a digest . It’s always the same length no matter how big the input is AND the output is always the same hash for any given input.
Detailed explanation-3: -A hash function is a versatile one-way cryptographic algorithm that maps an input of any size to a unique output of a fixed length of bits. The resulting output, which is known as a hash digest, hash value, or hash code, is the resulting unique identifier we mentioned earlier.
Detailed explanation-4: -The MD5 (message-digest algorithm) hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.
Detailed explanation-5: -SHA-1 produces a hash digest of 160 bits (20 bytes).