100% found this document useful (1 vote)
2K views3 pages

MCQ - Cryptography Hash Functions (Level - Easy)

The document contains 5 multiple choice questions about hash functions in cryptography. Hash functions take an input of arbitrary length and convert it to a fixed length output. They provide data integrity, authentication, and non-repudiation. Properties of hash functions include pre-image resistance and fixed length output. Hash functions cannot retrieve the original data from the hash value. Common names for the hash function output include hash value, hash code, and message digest.

Uploaded by

vikes singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views3 pages

MCQ - Cryptography Hash Functions (Level - Easy)

The document contains 5 multiple choice questions about hash functions in cryptography. Hash functions take an input of arbitrary length and convert it to a fixed length output. They provide data integrity, authentication, and non-repudiation. Properties of hash functions include pre-image resistance and fixed length output. Hash functions cannot retrieve the original data from the hash value. Common names for the hash function output include hash value, hash code, and message digest.

Uploaded by

vikes singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

7/12/2021 MCQ | Cryptography Hash Functions (Level: Easy)

Home Coding problems DS & Algo. ▾ Languages ▾ Web. ▾ Programs ▾ Aptitude ▾ Interview ▾

Find Output ▾ MCQ ▾ CS Subjects ▾ More ▾

Home »
Cryptography

MCQ | Cryptography Hash Functions (Level: Easy)

Here, we have a set of multiple-choice questions and answers (quiz) on hash functions in Cryptography
(basic concepts of Cryptography Hash Functions).
Submitted by Monika Sharma, on February 10, 2020

1) Which of the following is /are offered by the Hash functions?

a. Authentication
b. Non repudiation
c. Data Integrity
d. All of the above

Answer: d. All of the above

Explanation:

https://www.includehelp.com/cryptography/mcq-cryptography-hash-functions-level-easy.aspx 1/6
7/12/2021 MCQ | Cryptography Hash Functions (Level: Easy)

The Hash functions offer all the mentioned properties in a data compression: i.e. authentication, Non repudiation
and Data Integrity.

2) Which of the following is not a property of Hash Function?

a. Pre-Image Resistance
b. Compression
c. Fixed Length Output
d. None of the above

Answer: d. None of the above

Explanation:

All the first three options are the properties of the Hash function. None of the mentioned characteristic fall apart
form them. Therefore, the correct answer is none of the above.

3) Which of the following security services cannot be achieved using the Hash functions?
OR
Which of the following is not possible through hash value?

a. Password Check
b. Data Integrity check
c. Digital Signatures
d. Data retrieval in its original form

Answer: d. Data retrieval in its original form

Explanation:

As the hash functions are irreversible and has pre-image resistance property, therefore it is almost impossible to
obtain the original data form its hash value. Therefore, it is not possible to retrieve data in its original form from
its hash value.

4) Which of the following options is not correct according to the definition of the Hash Function?

a. Hash Functions are mathematical functions


b. They compress the input values
c. The hash functions work on arbitrary length input but produces fixed length output.
d. None of the above

Answer: d. None of the above

Explanation:

All the first three options obey to the definition of the Hash function. None of the mentioned options fall apart
form it. Therefore, the correct answer is none of the above.

https://www.includehelp.com/cryptography/mcq-cryptography-hash-functions-level-easy.aspx 2/6
7/12/2021 MCQ | Cryptography Hash Functions (Level: Easy)

5) "The Hash Function takes an input of arbitrary length and converts it into a fixed length output."
Which of the following names can we use for denoting the output of the hash function?

a. Hash value
b. Hash Code
c. Message Digest
d. All of the above

Answer: d. All of the above

Explanation:

All the mentioned names can be used to denote the output of a hash function. Therefore, the correct answer is
d. All of the above.

More...

MCQ | Cryptography Basics


MCQ | Cryptography Ciphers (Level: Easy) | Set 1
MCQ | Cryptography Ciphers (Level: Easy) | Set 2
MCQ | Cryptography Techniques of Block Cipher
MCQ | Block Cipher as IDEA, DES, AES, RSA in Cryptography
MCQ | Quantum Cryptography
MCQ | Hash Function Technique
MCQ | Modes of Operations in Block Cipher

ADVERTISEMENT

Write With Confidence


Check your grammar, spelling, and

punctuation instantly with

Grammarly

TOP Interview Coding Problems/Challenges

Run-length encoding (find/print frequency of letters in a string)


https://www.includehelp.com/cryptography/mcq-cryptography-hash-functions-level-easy.aspx 3/6

You might also like