Which of these is NOT a characteristic of a secure hash algorithm?

A. Collisions should be rare.
B. A message cannot be produced from a predefined hash.
C. The results of a hash function should not be reversed.
D. The hash should always be the same fixed size.


A. Collisions should be rare.

Computer Science & Information Technology

You might also like to view...

Which of the following is the second order of operations?

A) Exponentiation B) Multiplication C) Division D) Expressions within parentheses

Computer Science & Information Technology

A ____________________ is used to direct the reader to source documents or to files.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is found in the body of the method code that is used to document the method?

A. mutators B. parameters C. docstring D. arguments

Computer Science & Information Technology

In the Move dialog box, entering .5 in the Horizontal text box and .5 in the Vertical text box moves the selected object ____.

A. in a northeast direction. B. in a southeast direction. C. in a southwest direction. D. in a northwest direction.

Computer Science & Information Technology