SSL Complete Guide 2021: HTTP to HTTPS - SHA Hashing Algorithm and HMAC Overview

SSL Complete Guide 2021: HTTP to HTTPS - SHA Hashing Algorithm and HMAC Overview

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial covers various hash algorithms, including SHA-1, SHA-256, and SHA-512, explaining their hash lengths and usage. It demonstrates how to generate hashes using command line on a Mac and online tools. The tutorial also introduces the HMAC algorithm, highlighting its use of a secret key for added security and authentication.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the hash length of the SHA-1 algorithm?

512 bits

160 bits

128 bits

256 bits

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is used to generate a SHA-256 hash on a Mac?

shasum -a 1

shasum -a 256

shasum -a 512

shasum -a 128

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens to the hash when the input data is changed?

The hash remains the same

The hash becomes reversible

The hash changes slightly

The hash changes completely

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a hash algorithm mentioned in the video?

SHA-1

SHA-256

MD5

AES

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the HMAC algorithm?

To reverse a hash

To encrypt data

To compress data

To add a secret key to the hashing process

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the HMAC algorithm enhance security?

By using a longer hash

By using a secret key

By using a faster algorithm

By using a reversible process

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is required to generate the same HMAC hash on both sides?

The same hashing algorithm

The same secret key

The same operating system

The same input data