Providing Integrity with Hashing Flashcards
Md5 hash is how many bits long?
128bit
SHA-1 hash is how many bits long?
160bits
How do HIDS and anti-virus detect modified system files?
They scan the files initially and create and store hashes of them. When they scan them again, they run the hash again and compare the new hashes to the stored ones.
How does Hash-based Message Authentication Code expand on ordinary hashing?
The sender and receiver use a shared secret in addition to the hashing algorithm to add randomness to the final hash. Because the shared key is only known between the two parties, when the recipient calculates the hash, by virtue of it matching it means the key had to have been from the sender.
What 2 security protocols often use HMAC?
IPSec and TLS
What is the maximum hash size that RIPEMD can calculate?
320bits
What are the two hashes covered in the Sec+ exam that produce 160bit hashes?
SHA-1 and HMAC-SHA1
List SHA-2 and 3 hashing lengths
224-256-384-512
Which SHA version not created by the NSA?
SHA-3