UGC NET JRF November 2020 Paper-2
April 15, 2025Algorithms
April 16, 2025UGC NET JRF November 2020 Paper-2
| Question 32 |
Which among the following statement(s) is (are) true?
A) A hash function takes a message of arbitrary length and generates a fixed length code.
B) A hash function takes a message of fixed length and generates a code of variables.
C) A hash function may give the same value for distinct messages.
Choose the correct answer from the options given below:
A) A hash function takes a message of arbitrary length and generates a fixed length code.
B) A hash function takes a message of fixed length and generates a code of variables.
C) A hash function may give the same value for distinct messages.
Choose the correct answer from the options given below:
| (A) only | |
| (B) and (C) only | |
| (A) and (C) only | |
| (B) only |
Question 32 Explanation:
A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M).
In general terms, the principal object of a hash function is data integrity. A change to any bit or bits in M results, with high probability, in a change to the hash code.
Cryptographic hash function should have following two properties:
➡The one-way property: It should be computationally infeasible to find the data object that maps to a pre-specified hash result.
➡Collision-free property: No two data objects should map to the same hash result
Because of these characteristics, hash functions are often used to determine whether or not data has changed.
In general terms, the principal object of a hash function is data integrity. A change to any bit or bits in M results, with high probability, in a change to the hash code.
Cryptographic hash function should have following two properties:
➡The one-way property: It should be computationally infeasible to find the data object that maps to a pre-specified hash result.
➡Collision-free property: No two data objects should map to the same hash result
Because of these characteristics, hash functions are often used to determine whether or not data has changed.
Correct Answer: C
Question 32 Explanation:
A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M).
In general terms, the principal object of a hash function is data integrity. A change to any bit or bits in M results, with high probability, in a change to the hash code.
Cryptographic hash function should have following two properties:
➡The one-way property: It should be computationally infeasible to find the data object that maps to a pre-specified hash result.
➡Collision-free property: No two data objects should map to the same hash result
Because of these characteristics, hash functions are often used to determine whether or not data has changed.
In general terms, the principal object of a hash function is data integrity. A change to any bit or bits in M results, with high probability, in a change to the hash code.
Cryptographic hash function should have following two properties:
➡The one-way property: It should be computationally infeasible to find the data object that maps to a pre-specified hash result.
➡Collision-free property: No two data objects should map to the same hash result
Because of these characteristics, hash functions are often used to determine whether or not data has changed.
