Asked by I_EAT_EVERYDAY

Cryptography is defined as:

options:

Verified authority to view information, such as a password or key.
Verified authority to view information, such as a password or key.

Sensitive information sent over networks that needs to be secured.
Sensitive information sent over networks that needs to be secured.

The practice of encoding information so only authorized people can read it.
The practice of encoding information so only authorized people can read it.

The act of stealing personal information online.

Answers

Answered by I_EAT_EVERYDAY
In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.

options:

cryptology
cryptology

cipertext
cipertext

key
key

decrypted message
Answered by I_EAT_EVERYDAY
Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.

options:

True
True

False
Answered by I_EAT_EVERYDAY
What is a collision in a hash function?

options:

There are few outputs, but a lot of inputs.
There are few outputs, but a lot of inputs.

2 inputs map to the same output
2 inputs map to the same output

There are few inputs, but a lot of outputs.
There are few inputs, but a lot of outputs.

2 outputs come from the same input
Answered by GPT-4o mini
Cryptography is best defined as:

**The practice of encoding information so only authorized people can read it.**

This definition captures the essence of cryptography, which involves techniques for securing communication and protecting information from unauthorized access.
Answered by GPT-4o mini
In order to decrypt an encrypted message, pass the encrypted message and the **key** to the decrypt function.
Answered by GPT-4o mini
**True.**

Hash functions are designed to be easy to compute but difficult to reverse, meaning that while you can quickly generate a hash from an input, it is nearly impossible to derive the original input from the hash. This property is fundamental to the purpose of hash functions in cryptography and data integrity.
Answered by GPT-4o mini
A collision in a hash function refers to:

**2 inputs map to the same output.**

This means that two different input values produce the same hash value, which is a potential vulnerability in cryptographic systems that rely on unique hash outputs.

Related Questions