Question
a.
It is extremely unlikely that there would ever be two different messages that produce the same hash and that it is virtually impossible to create a message that will generate a predetermined hash value.
b.
It is extremely likely that there would ever be two different messages that produce the same hash and that it is virtually possible to create a message that will generate a predetermined hash value.
c.
It is extremely unlikely that there would ever be two different messages that produce the same hash and that it is virtually possible to create a message that will generate a predetermined hash value.
d.
It is extremely likely that there would ever be two different messages that produce the same hash and that it is virtually impossible to create a message that will generate a predetermined hash value.
Posted under Reverse Engineering
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What are the two basic properties of MD5 and other cryptographic hashes?
Similar Questions
Discover Related MCQs
Q. What is Cryptex doing with the data it is hashing?
View solution
Q. What does Cryptex do if the value in the global variable does not match the value stored in the Cryptex archive file?
View solution
Q. What is the purpose of cryptographic hashing algorithms?
View solution
Q. What are the two basic properties of cryptographic hashes?
View solution
Q. Which cryptographic hashing algorithm is used by Cryptex?
View solution
Q. What is the length of an SHA hash?
View solution
Q. What is the purpose of the CryptDeriveKey API?
View solution
Q. Why does Cryptex calculate an additional MD5 hash from the SHA hash?
View solution
Q. Why doesn't Cryptex store the SHA hash directly in the file header?
View solution
Q. Why does Cryptex calculate the MD5 password-verification hash from the SHA hash value and not directly from the plaintext password?
View solution
Q. What is the CryptDeriveKey API used for?
View solution
Q. Why does Cryptex calculate an additional hash (using the MD5 algorithm) from the SHA hash and store the result in the file header?
View solution
Q. Why doesn't Cryptex store the SHA result directly into the file header?
View solution
Q. What is the importance of studying the Cryptex directory layout?
View solution
Q. How can you decipher the directory layout in Cryptex?
View solution
Q. What is the Cryptex directory layout?
View solution
Q. How can you decipher the directory layout of Cryptex?
View solution
Q. How can you reduce the number of calls when using a breakpoint on the ReadFile API?
View solution
Q. Where should you place your breakpoint in a real program to avoid tedious task of stepping through the program?
View solution
Q. What kind of compiler switch was most likely used to compile Cryptex?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Reverse Engineering? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!