A hash function is:
a. A one-way function that mathematically manipulates the input data to create an output value
b. A one-way function that uses a cipher to produce a piece of data that helps to encrypt other data
c. A one-way function that creates a random number as a digital signature
d. A two-way function that, used in conjunction with a key, takes cleartext and encrypts it into ciphertext
Answer: A
Learn More :
Encryption
- What is used along with an encryption algorithm (cipher) to encode and decode data?
- When using ______ cryptography, two people decide on a mutual key in a safe or secure way in order to exchange encrypted data with one another.
- Using symmetric key encryption alone, data is vulnerable to a man-in-the-middle attack.
- The length of an encryption key is important because:
- The lowest level of attack or simplest attack for cracking an encryption key would be a dictionary attack, which is basically trying to crack a key by trial and error.
- Which of the following is an example of a brute force attack?
- Secure Sockets Layer or SSL, which uses a encryption algorithm, is the encryption technique that is used by Secure HTTP, thus enabling e-commerce.
- What is a public key?
- It is important to use reputable certificate authorities since:
- Which of the following is true?
- Which of the following is true?
- What happens when signing a document with a digital signature?
- An encryption function takes ciphertext and a key as input and returns cleartext, provided the correct key is used.
- Why must a private key not be stored with the data it has encrypted?
- The words sunny day are encrypted to produce the text wnta lia. Which of the following is considered to be the cleartext in this example?
- A(n) ______ function takes data and a secret key as input and uses the secret key to scramble/encode the data, producing ciphertext that cannot be deciphered by anyone other than the appropriate parties.
- Certificate Authorities assure involved parties that the right people are sending or receiving the correct information by:
- What is a certificate authority (CA)?
- By acting as the creators and distributors of ______, certificate authorities use public key encryption to prevent man-in-the-middle attacks.
- A simple Caesar cipher uses a shift to encrypt while the XOR cipher needs a key to encrypt.
- ___ is the technical term for the encryption algorithm used to encrypt or decrypt a piece of data.
- Which of the following statements is true?
- A cracked encryption key is a key that:
- The study of encrypting data so that confidentiality between two parties is maintained is known as: