adplus-dvertising
frame-decoration

Question

What are the two basic properties of cryptographic hashes?

a.

The hash is extremely likely to produce the same hash value for different messages

b.

It is extremely likely that there would ever be two different messages that produce the same hash

c.

It is extremely unlikely to create a message that will generate a predetermined hash value

d.

Both b and c

Posted under Reverse Engineering

Answer: (d).Both b and c Explanation:Two basic properties of cryptographic hashes are that it is extremely unlikely that there would ever be two different messages that produce the same hash and that it is virtually impossible to create a message that will generate a predetermined hash value.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What are the two basic properties of cryptographic hashes?

Similar Questions

Discover Related MCQs

Q. Which cryptographic hashing algorithm is used by Cryptex?

Q. What is the length of an SHA hash?

Q. What is the purpose of the CryptDeriveKey API?

Q. Why does Cryptex calculate an additional MD5 hash from the SHA hash?

Q. Why doesn't Cryptex store the SHA hash directly in the file header?

Q. Why does Cryptex calculate the MD5 password-verification hash from the SHA hash value and not directly from the plaintext password?

Q. What is the CryptDeriveKey API used for?

Q. Why does Cryptex calculate an additional hash (using the MD5 algorithm) from the SHA hash and store the result in the file header?

Q. Why doesn't Cryptex store the SHA result directly into the file header?

Q. What is the importance of studying the Cryptex directory layout?

Q. How can you decipher the directory layout in Cryptex?

Q. What is the Cryptex directory layout?

Q. How can you decipher the directory layout of Cryptex?

Q. How can you reduce the number of calls when using a breakpoint on the ReadFile API?

Q. Where should you place your breakpoint in a real program to avoid tedious task of stepping through the program?

Q. What kind of compiler switch was most likely used to compile Cryptex?

Q. What is the purpose of the x command in Cryptex?

Q. Why is it important to reverse the extraction process in Cryptex?

Q. What is the purpose of the hash object created in the Cryptex file extraction routine?

Q. What type of algorithm is used to create the hash object in the Cryptex file extraction routine?