Answer the following statements true (T) or false (F)

1. Virtually all cryptographic hash functions involve the iterative use of a compression function.
2. A good hash function has the property that “the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random”.
3. Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.
4. Hash functions can be used for intrusion and virus detections.
5. Whirlpool is a popular cryptographic hash function.

1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. TRUE

Computer Science & Information Technology

You might also like to view...

A liquid solution for cleaning optical discs is _______

Fill in the blank(s) with correct word

Computer Science & Information Technology

An investigation plan that details the background of the suspects relates to which aspect of SMEAC?

a. execution b. mission c. communications d. situation

Computer Science & Information Technology