Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input. (2 points)%0D%0AResponses%0D%0A%0D%0ATrue%0D%0ATrue%0D%0A%0D%0AFalse%0D%0AFalse%0D%0AQuestion 4%0D%0AWhat is a collision in a hash function?(2 points)%0D%0AResponses%0D%0A%0D%0A2 inputs map to the same output%0D%0A2 inputs map to the same output%0D%0A%0D%0AThere are few inputs, but a lot of outputs. %0D%0AThere are few inputs, but a lot of outputs. %0D%0A%0D%0AThere are few outputs, but a lot of inputs.%0D%0AThere are few outputs, but a lot of inputs.%0D%0A%0D%0A2 outputs come from the same input%0D%0A2 outputs come from the same input%0D%0AQuestion 5%0D%0AWhat do most attacks on hash functions involve?%0D%0A%0D%0AA. Finding Collisions%0D%0AB. Pre-generating millions of hashes and comparing them to the plain text that generates it. %0D%0AC. Really good random guessing.%0D%0A%0D%0A(2 points)%0D%0AResponses%0D%0A%0D%0AA and B%0D%0AA and B%0D%0A%0D%0AA and C%0D%0AA and C%0D%0A%0D%0AB and C%0D%0AB and C%0D%0AQuestion 6%0D%0A_____________ is the process of decrypting coded messages without being told the key.(2 points)%0D%0AResponses%0D%0A%0D%0ACryptanalysis%0D%0ACryptanalysis%0D%0A%0D%0ACryptology%0D%0ACryptology%0D%0A%0D%0ACryptography%0D%0ACryptography%0D%0AQuestion 7%0D%0AThe practice of solving and writing encryptions is ______________.(2 points)%0D%0AResponses%0D%0A%0D%0Acryptanalysis%0D%0Acryptanalysis%0D%0A%0D%0Acryptology%0D%0Acryptology%0D%0A%0D%0Acryptography%0D%0Acryptography%0D%0AQuestion 8%0D%0A________________ is the output from any input that has been processed through a hashing algorithm/function.(2 points)%0D%0AResponses%0D%0A%0D%0ADigest%0D%0ADigest%0D%0A%0D%0ACollision%0D%0ACollision%0D%0A%0D%0AFirewalls%0D%0AFirewalls%0D%0AQuestion 9%0D%0AA general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.(2 points)%0D%0AResponses%0D%0A%0D%0ATrue%0D%0ATrue%0D%0A%0D%0AFalse%0D%0AFalse%0D%0AQuestion 10%0D%0AThe word hashing literally means to scramble.(2 points)%0D%0AResponses%0D%0A%0D%0ATrue%0D%0ATrue%0D%0A%0D%0AFalse%0D%0AFalse

Responses:

Question 4
What is a collision in a hash function?
- 2 inputs map to the same output

Question 5
What do most attacks on hash functions involve?
- A and B (Finding Collisions and Pre-generating millions of hashes and comparing them to the plaintext that generates it.)

Question 6
_____________ is the process of decrypting coded messages without being told the key.
- Cryptanalysis

Question 7
The practice of solving and writing encryptions is ______________.
- Cryptography

Question 8
________________ is the output from any input that has been processed through a hashing algorithm/function.
- Digest

Question 9
A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.
- True

Question 10
The word hashing literally means to scramble.
- True

True

Question 4: What is a collision in a hash function?

A collision in a hash function occurs when two different inputs produce the same output. In other words, two inputs map to the same hash value. This can happen because hash functions have a fixed output size, while the number of possible inputs can be much larger. Therefore, collisions are unavoidable in hash functions, but good hash functions aim to minimize the likelihood of collisions occurring.

Question 5: What do most attacks on hash functions involve?

Most attacks on hash functions involve two main things: finding collisions and pre-generating hashes. Finding collisions means trying to find two different inputs that produce the same hash output. Pre-generating millions of hashes involves calculating the hash values for a large number of inputs and comparing them to the target hash, usually in an attempt to find a match. So, the correct answer is A and B.

Question 6: _____________ is the process of decrypting coded messages without being told the key.

The correct answer is Cryptanalysis. Cryptanalysis is the practice of analyzing and breaking codes or encrypted messages without having access to the encryption key. It involves various techniques, including mathematical analysis, pattern recognition, and statistical analysis, to uncover vulnerabilities in encryption algorithms and decipher the hidden information.

Question 7: The practice of solving and writing encryptions is ______________.

The correct answer is Cryptography. Cryptography is the field of study and practice that involves creating, analyzing, and solving codes and encryption systems. It encompasses designing secure algorithms and protocols to protect information and communication from unauthorized access or tampering.

Question 8: _________________ is the output from any input that has been processed through a hashing algorithm/function.

The correct answer is Digest. A digest is the output produced by applying a hash function to an input or message. It is a fixed-size representation of the original data, typically a sequence of alphanumeric characters or bits. Hash functions are designed to generate unique digests for different inputs, making them useful for data integrity checks, password storage, and digital signatures.

Question 9: A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.

The correct answer is False. A general property of a good encryption algorithm is that it should be easy to encrypt data using the algorithm, but computationally difficult (not impossible) to decrypt the encrypted data without the proper decryption key. The security of an encryption algorithm lies in its ability to resist attacks and keep the encrypted data secure, even if the algorithm itself is known.

Question 10: The word hashing literally means to scramble.

The correct answer is False. The word "hashing" does not mean to scramble. In computer science and cryptography, hashing refers to the process of taking an input (such as a message or data) and applying a specific hash function to produce a fixed-size output (hash value or digest). The hash function transforms the input in a deterministic way, generating a unique representation that is typically used for data integrity checks, password storage, and various other applications.