Page 1 of 1

Problem 5: Consider the hash function SHA-1 covered in Lecture 12 and the following two statements: (1) The input messag

Posted: Fri May 20, 2022 10:36 am
by answerhappygod
Problem 5 Consider The Hash Function Sha 1 Covered In Lecture 12 And The Following Two Statements 1 The Input Messag 1
Problem 5 Consider The Hash Function Sha 1 Covered In Lecture 12 And The Following Two Statements 1 The Input Messag 1 (169.8 KiB) Viewed 35 times
Problem 5: Consider the hash function SHA-1 covered in Lecture 12 and the following two statements: (1) The input message size of SHA-1 is limited to 264 bits because in real-world applications no message can have more than 264 bits. (2) The purpose of using the four different kinds of operations ^, V, 0, and +232 is to provide confusion in SHA-1. Which of the following statements is true? 10 marks (A) Statement (1) is true, but Statement (2) is false. (B) Statement (2) is true, but Statement (1) is false. (C) Both Statements (1) and (2) are true. (D) Both Statements (1) and (2) are false.