Hashing Flashcards

1
Q

What is hash value of MD5?

A

128

Note: Known to have collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SHA-1’s hash value?

A

160

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the SHA-2 and SHA-3 hash values?

A

SHA-224
SHA-256
SHA-348
SHA-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SHA’s main competitor is RACE Integrity Primitive Evaluation Message Digest (RIPEMD) - What are its hash values?

A

160
256
320

Note: 160-bit is the most commonly used. It is open source, made to compete with SHA but not as popular.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Hash-based Message Authentication Code (HMAC) do? How?

A

Uses a hash algorithm, to check the integrity of a message and authenticity.

It uses other hash algorithms to do the work.  
Exa:
HMAC-MD5
HMAC-SHA1
HMAC-SHA256
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is a digital signature created?

A

The file/email to be sent, is hashed. The sender uses then uses their private key, and encrypts the hash. Then the email is sent, along with the encrypted hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you verify a digital signature?

A

The receiver takes the digital signature and decrypts it with the senders public key to reveal the hash value before decryption. The receiver then takes the original message and hashes it with the same hash algorithm. If the hash value is the same as the one in the digital signature, then the message is authentic and can not be repudiated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What hash algorithms are used for digital signatures?

A

DSA (Digital Security Algorithm)
RSA
ECDSA (Elliptic Curve DSA)
SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What other uses are digital signatures good for?

A

Code signing of software code to verify it hasn’t been modified or tampered with after it was submitted by the developer.

Note: Apple and Google send each developer a private key that must be used to digitally sign the code of their mobile app install file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the first HASH algorithm that was used to protect passwords?

A

LANMAN Hash (LM Hash).

Used by Windows, based on the DES algorithm. It is only 14 characters long. Super not safe. Still exists but it is auto-disabled in Windows.

Note: OOOLLLD. Was made in the 80’s. Don’t turn it on unless you have a VERY good reason.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the second HASH algorithm for passwords?

A

NT LAN Manager Hash (NTLM Hash)

Uses RC4. Still exists but it is auto-disabled in Windows.

Note: Used in the of Windows NT 3.1, back in 1993.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the current HASH algorithm used to store passwords?

A

NTLMv2 Hash

Uses HMAC-MD5 and is difficult to crack. This is used for Windows computers that do not use Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Exam Tips

A

Hashing is used to ensure integrity. If you see a question about integrity on the exam, instantly think of hashing.

Remember that MD5 and SHA are the most commonly used hash functions. Also remember that MD5 is less secure than SHA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly