COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Encrypt plaintext
|
|
Decrypt plaintext
|
|
Ensure that message have not changed.
|
|
None of the above
|
Detailed explanation-1: -Hashing is useful to ensure the authenticity of a piece of data, as any small change to the message will result in a completely different hash value. Hash functions are the basic tools of modern cryptography that are used in information security to authenticate transactions, messages, and digital signatures.
Detailed explanation-2: -Hash functions are used for data integrity and often in combination with digital signatures. With a good hash function, even a 1-bit change in a message will produce a different hash (on average, half of the bits change). With digital signatures, a message is hashed and then the hash itself is signed.
Detailed explanation-3: -Hashing is useful in data structure for indexing and retrieving dataset items. It also enables verification by detecting modifications. In cryptography, hashing takes plaintext data (input) and runs is through a mathematical process known as a hashing algorithm.
Detailed explanation-4: -Hash values represent large amounts of data as much smaller numeric values, so they are used with digital signatures. You can sign a hash value more efficiently than signing the larger value. Hash values are also useful for verifying the integrity of data sent through insecure channels.
Detailed explanation-5: -Hashing is a cryptographic method used to change datasets and characters of any length into compact, fixed hash values. In doing so, hashing offers more security than encryption since hash values cannot be converted back into their original values without the key.