Which of the following concepts describes the use of a one way transformation in order to validate the integrity of a program?
A. Hashing
B. Key escrow
C. Non-repudiation
D. Steganography
Explanation:
One Comment on “Which of the following concepts describes the use of a one way transformation in order to validate the integri”
meacsays:
A.Hashing
Hashing refers to the hash algorithms used in cryptography. It is used to store data, such as hash tables and its main characteristics are:
It must be one-way it is not reversible.
Variable-length input produces fixed-length output whether you have two characters or 2 million, the hash size is the same.
The algorithm must have few or no collisions in hashing two different inputs does not give the same output.
B.Key escrow
Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys.
C.Non-repudiation
Nonrepudiation is the assurance that someone cannot deny something. Typically, nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.
D.Steganography
from Greek steganos, or “covered,” and graphie, or “writing”) is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
A.Hashing
Hashing refers to the hash algorithms used in cryptography. It is used to store data, such as hash tables and its main characteristics are:
It must be one-way it is not reversible.
Variable-length input produces fixed-length output whether you have two characters or 2 million, the hash size is the same.
The algorithm must have few or no collisions in hashing two different inputs does not give the same output.
B.Key escrow
Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys.
C.Non-repudiation
Nonrepudiation is the assurance that someone cannot deny something. Typically, nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.
D.Steganography
from Greek steganos, or “covered,” and graphie, or “writing”) is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
So the correct answer is clearly: A.Hashing
0
0