Hashing and Encryption Flashcards
What is the purpose of a cryptographic hash function?
To take an input and produce a fixed-size string of bytes, typically a digest, that is unique to that input.
Fill in the blank: The output of a hash function is called a ______.
Digest or Hash.
What does SHA stand for in SHA-256?
Secure Hash Algorithm.
What is the key difference between symmetric and asymmetric encryption?
Symmetric encryption uses one key for both encryption and decryption, while asymmetric encryption uses a public and a private key.
Fill in the blank: RSA is an example of ______ encryption.
Asymmetric.
What is the length of the output of the SHA-256 hash function?
256 bits.
Name an encryption algorithm commonly used for symmetric encryption.
AES (Advanced Encryption Standard).
What does MD5 stand for in hashing algorithms?
Message Digest Algorithm 5.
True or False: MD5 is still considered secure for cryptographic use cases.
False. MD5 is considered broken and insecure for cryptographic use.
What is the primary purpose of the RSA algorithm?
To securely transmit data using public-key cryptography.
Fill in the blank: AES stands for ______.
Advanced Encryption Standard.
Which cryptographic hash function is commonly used in Bitcoin?
SHA-256.
What is the key size for AES-256 encryption?
256 bits.
True or False: Hash functions are reversible.
False. Hash functions are one-way and non-reversible.
Fill in the blank: In asymmetric encryption, the public key is used for ______, and the private key is used for ______.
encryption, decryption.
What is the primary function of a digital signature?
To verify the authenticity and integrity of a message or document.
Name an example of a hashing algorithm other than SHA-256.
MD5, SHA-1, or SHA-3.
Which algorithm is faster for encrypting large amounts of data, RSA or AES?
AES. RSA is slower and typically used for key exchange, not bulk data encryption.
True or False: In symmetric encryption, both parties use the same key.
True.
Fill in the blank: The process of converting plaintext into ciphertext is known as ______.
Encryption.
What is the primary weakness of the DES (Data Encryption Standard) algorithm?
Its key size is too small, making it vulnerable to brute-force attacks.
What is the difference between SHA-1 and SHA-256?
SHA-256 provides a longer output (256 bits) compared to SHA-1 (160 bits) and is more secure.
Name a common use case for hashing algorithms.
Data integrity checks, digital signatures, or password hashing.
Fill in the blank: The ______ algorithm is a standard for secure key exchange in public key cryptography.
Diffie-Hellman.
What is the size of an MD5 hash output?
128 bits.
Why is AES considered more secure than DES?
AES uses larger key sizes (128, 192, or 256 bits) compared to DES’s 56-bit key, making it more resistant to brute-force attacks.
What does the acronym ‘PGP’ stand for in encryption?
Pretty Good Privacy.
True or False: Cryptographic hashes are collision-resistant.
True, for strong cryptographic hash functions, but collisions are possible if vulnerabilities exist.
Fill in the blank: A ______ occurs when two different inputs produce the same hash value.
Collision.