Question
a.
Because it is impossible to extract the original plaintext password from the SHA hash value
b.
Because it would make it incredibly easy to decrypt Cryptex archives
c.
Because someone would be able to covert the MD5 hash value to an equivalent SHA hash value and effectively obtain the decryption key
d.
Because the SHA hash is directly used as the encryption key
Posted under Reverse Engineering
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Why doesn't Cryptex store the SHA result directly into the file header?
Similar Questions
Discover Related MCQs
Q. What is the importance of studying the Cryptex directory layout?
View solution
Q. How can you decipher the directory layout in Cryptex?
View solution
Q. What is the Cryptex directory layout?
View solution
Q. How can you decipher the directory layout of Cryptex?
View solution
Q. How can you reduce the number of calls when using a breakpoint on the ReadFile API?
View solution
Q. Where should you place your breakpoint in a real program to avoid tedious task of stepping through the program?
View solution
Q. What kind of compiler switch was most likely used to compile Cryptex?
View solution
Q. What is the purpose of the x command in Cryptex?
View solution
Q. Why is it important to reverse the extraction process in Cryptex?
View solution
Q. What is the purpose of the hash object created in the Cryptex file extraction routine?
View solution
Q. What type of algorithm is used to create the hash object in the Cryptex file extraction routine?
View solution
Q. What is the purpose of the "x command" in Cryptex?
View solution
Q. What is the purpose of the MD5 checksum in the Cryptex header?
View solution
Q. How is the triple-DES key generated in Cryptex?
View solution
Q. What algorithm does Cryptex use to encrypt its archives?
View solution
Q. What is the purpose of the 8-byte signature in the Cryptex header?
View solution
Q. What is the purpose of the 16-byte MD5 hash that ends up in the Cryptex header?
View solution
Q. What algorithm is used to encrypt all clusters in Cryptex archives?
View solution
Q. What is the maximum length of file names in Cryptex archives?
View solution
Q. How are unused entries in the Cryptex file list table indicated?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Reverse Engineering? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!