nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #199

CERTIFIED-IN-CYBERSECURITY Question #199: Real Exam Question with Answer & Explanation

The correct answer is C: The function must work on a variety of input sizes. The requirement for a cryptographic hash function to work on various input sizes is not necessary. A hash function is a mathematical algorithm that takes input data and produces an output (a hash value), a compact representation of the original data. The hash function must be eff

Cryptography

Question

Which requirement is not necessary for a cryptographic hash function?

Options

  • AThe function must have a low probability of producing the same output for different inputs
  • BThe function must be efficient to compute
  • CThe function must work on a variety of input sizes
  • DThe function must be one way

Explanation

The requirement for a cryptographic hash function to work on various input sizes is not necessary. A hash function is a mathematical algorithm that takes input data and produces an output (a hash value), a compact representation of the original data. The hash function must be efficient to compute, meaning it should be able to generate the hash value quickly. It must be one-way, which means obtaining the original input data from the hash value (i.e. reversing the function) should be computationally infeasible. And it must have a low probability of producing the same output for different inputs, also known as 'collision resistance'. The input size can be fixed or variable, depending on the specific hash function, but it is not necessary for a hash function to be considered cryptographic.

Topics

#Cryptographic Hashes#Cryptography Principles#Hash Function Properties

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions