adplus-dvertising
frame-decoration

Question

Consider the following properties:

Variable Input size
Fixed Output size
Efficiency
Pre image resistant
Second Pre image Resistant
Collision resistant
Pseudo randomness

A has function that satisfies the first _______ properties in the above table is referred to as a weak hash function.

a.

5

b.

4

c.

3

d.

2

Answer: (a).5

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Consider the following properties: Variable Input size Fixed Output size Efficiency Pre image resistant Second Pre image Resistant Collision resistant Pseudo...

Similar Questions

Discover Related MCQs

Q. A function that is second pre-image resistant is also collision resistant.

Q. Which attack requires the least effort/computations?

Q. SHA-1 produces a hash value of

Q. What is the number of round computation steps in the SHA-256 algorithm?

Q. In SHA-512, the message is divided into blocks of size ___ bits for the hash computation.

Q. What is the maximum length of the message (in bits) that can be taken by SHA-512?

Q. The message in SHA-512 is padded so that it’s length is

Q. The big-endian format is one in which

Q. In SHA-512, the registers ‘a’ to ‘h’ are obtained by taking the first 64 bits of the fractional parts of the cube roots of the first 8 prime numbers.

Q. What is the size of W (in bits) in the SHA-512 processing of a single 1024- bit block?

Q. In the SHA-512 processing of a single 1024- bit block, the round constants are obtained

Q. The output of the N 1024-bit blocks from the Nth stage is

Q. Among the registers ‘a’ to ‘h’ how many involve permutation in each round?

Q. The registers ‘a’ and ‘e’ involve

Q. In SHA-512, W16 is dependent on

Q. What is the number of operation required to come up with 2 messages having the same message digest in SHA-512?

Q. The underlying structure of the SHA-3 algorithm is referred to as

Q. SHA-3 allows variable length input and output.

Q. Multi-rate padding is denoted by

Q. In SHA-3, if the desired output is l bits, then j blocks are produced, such that