Duplicate Question
The question on this page has been marked as a duplicate question.
Original Question
Cryptography is defined as:(2 points) Responses Verified authority to view information, such as a password or key. Verified aut...Asked by I_EAT_EVERYDAY
Cryptography is defined as:
options:
Verified authority to view information, such as a password or key.
Verified authority to view information, such as a password or key.
Sensitive information sent over networks that needs to be secured.
Sensitive information sent over networks that needs to be secured.
The practice of encoding information so only authorized people can read it.
The practice of encoding information so only authorized people can read it.
The act of stealing personal information online.
options:
Verified authority to view information, such as a password or key.
Verified authority to view information, such as a password or key.
Sensitive information sent over networks that needs to be secured.
Sensitive information sent over networks that needs to be secured.
The practice of encoding information so only authorized people can read it.
The practice of encoding information so only authorized people can read it.
The act of stealing personal information online.
Answers
Answered by
I_EAT_EVERYDAY
In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.
options:
cryptology
cryptology
cipertext
cipertext
key
key
decrypted message
options:
cryptology
cryptology
cipertext
cipertext
key
key
decrypted message
Answered by
I_EAT_EVERYDAY
Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.
options:
True
True
False
options:
True
True
False
Answered by
I_EAT_EVERYDAY
What is a collision in a hash function?
options:
There are few outputs, but a lot of inputs.
There are few outputs, but a lot of inputs.
2 inputs map to the same output
2 inputs map to the same output
There are few inputs, but a lot of outputs.
There are few inputs, but a lot of outputs.
2 outputs come from the same input
options:
There are few outputs, but a lot of inputs.
There are few outputs, but a lot of inputs.
2 inputs map to the same output
2 inputs map to the same output
There are few inputs, but a lot of outputs.
There are few inputs, but a lot of outputs.
2 outputs come from the same input
Answered by
GPT-4o mini
Cryptography is best defined as:
**The practice of encoding information so only authorized people can read it.**
This definition captures the essence of cryptography, which involves techniques for securing communication and protecting information from unauthorized access.
**The practice of encoding information so only authorized people can read it.**
This definition captures the essence of cryptography, which involves techniques for securing communication and protecting information from unauthorized access.
Answered by
GPT-4o mini
In order to decrypt an encrypted message, pass the encrypted message and the **key** to the decrypt function.
Answered by
GPT-4o mini
**True.**
Hash functions are designed to be easy to compute but difficult to reverse, meaning that while you can quickly generate a hash from an input, it is nearly impossible to derive the original input from the hash. This property is fundamental to the purpose of hash functions in cryptography and data integrity.
Hash functions are designed to be easy to compute but difficult to reverse, meaning that while you can quickly generate a hash from an input, it is nearly impossible to derive the original input from the hash. This property is fundamental to the purpose of hash functions in cryptography and data integrity.
Answered by
GPT-4o mini
A collision in a hash function refers to:
**2 inputs map to the same output.**
This means that two different input values produce the same hash value, which is a potential vulnerability in cryptographic systems that rely on unique hash outputs.
**2 inputs map to the same output.**
This means that two different input values produce the same hash value, which is a potential vulnerability in cryptographic systems that rely on unique hash outputs.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.