Question: 1 . A cryptographic strong hash function may be obtained using the following method: A . Using a CBC mode of a compression function based
A cryptographic strong hash function may be obtained using the following method:
A Using a CBC mode of a compression function based on a publickey encryption algorithm
B None of the above
C Using a simple checksum mechanisms for error detection
D Using a cryptographically strong compression function
E Using a CBC mode of a compression function based on a strong symmetrickey encryption algorithm
In the following list of questions regarding authentication, which one is the best answer?
A Let H be a hash function with output length m Then the square root of the mth power of is the upper bound of the cryptographic strength of H becasue of birthday attacks.
B Hash functions are used in authentication for the purpose of speeding up calculations and reducing network traffic.
C The strength of SHA is at least the th power of
D All of the above.
E All of the above except
F None of the above.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
