Which of these is a characteristic of a secure hash algorithm?

A. A digest of a short set and a long set of data should produce different sizes
B. Two different sets of data cannot produce the same digest
C. The results of a hash function should be reversible
D. It should be possible to produce a data set that has a desired or predefined hash


Answer: B

Computer Science & Information Technology

You might also like to view...

Draw a simplified decision tree to represent the Big State University catalog. Describe the results.

What will be an ideal response?What will be an ideal response?

Computer Science & Information Technology

Yahoo! is an example of a metasearch engine

Indicate whether the statement is true or false

Computer Science & Information Technology

To create a query that includes a customer and the products that the customer has purchased would require you to create a(n) ________

A) query join B) inner join C) outer join D) unmatched query

Computer Science & Information Technology

The _____ Merge Shape command removes the second shape selected, including any part of the first shape that is overlapped by the second shape.

A. Combine B. Fragment C. Intersect D. Subtract

Computer Science & Information Technology