
CNS - Unit 3 Hash Functions and Digital Signatures
Authored by Tejeswinee Kandhavel
University
Used 31+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Release of message contents to any person or process not possessing the appropriate cryptographic key is called _________.
Traffic Analysis
Disclosure
Masquerade
Non-repudiation
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following are the different classes of message authentication function?
hash function
Message Encryption
Message Authentication Code
All of the above
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What makes MAC different from a hash function?
Hash Function
Message
Secret Key
Encryption algorithm
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following brought the blockchain implementation to the limelight?
Bitcoin
Ethereum
Zcash
None of the above
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Padding in MD5 is done so that the length L of the message satisfies which formula?
L = 446 mod 512
L = 896 mod 1024
L = 324 mod 512
L = 128 mod 512
L = 448 mod 512
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the size of each register used in SHA 512 algorithm?
32 bits
48 bits
16 bits
64 bits
128 bits
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The total length of the message after padding and adding length representation in SHA 512 is ______________.
L x 512 bits
L x 1024 bits
L x 1028 bits
L x 128 bits
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?