COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Select the TWO correct answers of hash function security use
A
To ensure that transmitted messages have tampered
B
Message fingerprint
C
Downline load a program
D
None of the above
Explanation: 

Detailed explanation-1: -Hash functions are also referred to as hashing algorithms or message digest functions. They are used across many areas of computer science, for example: To encrypt communication between web servers and browsers, and generate session IDs for internet applications and data caching.

Detailed explanation-2: -A cryptographic hash function has provable security against collision attacks if finding collisions is provably polynomial-time reducible from problem P which is supposed to be unsolvable in polynomial time. The function is then called provably secure, or just provable.

Detailed explanation-3: -Answer: All of the given options such as MD5, Triple DES, and SHA-1 are examples of hash functions. These are cryptographic in nature and therefore suitable for cryptography.

Detailed explanation-4: -2-choice hashing utilizes two hash functions h1(x) and h2(x) which work as hash functions are expected to work (i.e. mapping integers from the universe into a specified range). The two hash functions should be independent and have no correlation to each other.

There is 1 question to complete.