212-82 · Question #127
212-82 Question #127: Real Exam Question with Answer & Explanation
The correct answer is D: SHA-3. as it is designed to be resistant against quantum computing attacks. To protect a new cryptographic protocol against potential quantum computing attacks, the team should select SHA-3 due to its design principles intended for enhanced resilience against future quantum threats.
Question
In an advancedcybersecurity research lab. a team Is working on developing a new cryptographicprotocol to secure highly sensitive communication. Their goal is to create aprotocol that is resilient against quantum computing attacks, which couldpotentially break many current encryption methods. During their research, theyfocus on the use of hash functions in their protocol. The team experiments withvarious hash functions to ensure the highest level of security. Considering thethreat of quantum computing, which of the following hash functions would be themost appropriate choice fortheir protocol?
Options
- ASHA-256, due to its widespread use and proven security track record
- BMD5, for its speed and efficiency in generating hash values
- CHMAC. for its ability to provide data integrity and authentication
- DSHA-3. as it is designed to be resistant against quantum computing attacks
Explanation
To protect a new cryptographic protocol against potential quantum computing attacks, the team should select SHA-3 due to its design principles intended for enhanced resilience against future quantum threats.
Common mistakes.
- A. SHA-256 is part of the SHA-2 family, which while strong against classical attacks, is not specifically designed or considered resilient against quantum computing's potential to significantly reduce its effective security through algorithms like Grover's.
- B. MD5 is cryptographically broken and highly vulnerable to collision attacks, making it entirely unsuitable for any new secure protocol, especially one concerned with advanced threats like quantum computing.
- C. HMAC is a mechanism for message authentication that uses a hash function, but it is not a hash function itself and does not inherently provide quantum resistance for the underlying hash algorithm it employs.
Concept tested. Quantum-resistant hash functions, cryptographic protocol design
Reference. https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
Topics
Community Discussion
No community discussion yet for this question.