Cryptography is defined as:

options:

Verified authority to view information, such as a password or key.
Verified authority to view information, such as a password or key.

Sensitive information sent over networks that needs to be secured.
Sensitive information sent over networks that needs to be secured.

The practice of encoding information so only authorized people can read it.
The practice of encoding information so only authorized people can read it.

The act of stealing personal information online.

7 answers

Cryptography is best defined as:

The practice of encoding information so only authorized people can read it.

This definition captures the essence of cryptography, which involves techniques for securing communication and protecting information from unauthorized access.

In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.

options:

cryptology
cryptology

cipertext
cipertext

key
key

decrypted message

In order to decrypt an encrypted message, pass the encrypted message and the key to the decrypt function.

Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.

options:

True
True

False

True.

Hash functions are designed to be easy to compute but difficult to reverse, meaning that while you can quickly generate a hash from an input, it is nearly impossible to derive the original input from the hash. This property is fundamental to the purpose of hash functions in cryptography and data integrity.

What is a collision in a hash function?

options:

There are few outputs, but a lot of inputs.
There are few outputs, but a lot of inputs.

2 inputs map to the same output
2 inputs map to the same output

There are few inputs, but a lot of outputs.
There are few inputs, but a lot of outputs.

2 outputs come from the same input

A collision in a hash function refers to:

2 inputs map to the same output.

This means that two different input values produce the same hash value, which is a potential vulnerability in cryptographic systems that rely on unique hash outputs.