0
0
Cybersecurityknowledge~20 mins

Hashing algorithms (SHA, MD5) in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Hashing Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Hash Function Output Lengths

Which of the following correctly describes the output length of the MD5 and SHA-256 hashing algorithms?

AMD5 produces a 128-bit hash, while SHA-256 produces a 256-bit hash.
BMD5 produces a 256-bit hash, while SHA-256 produces a 128-bit hash.
CBoth MD5 and SHA-256 produce 256-bit hashes.
DBoth MD5 and SHA-256 produce 128-bit hashes.
Attempts:
2 left
💡 Hint

Think about the number in the SHA-256 name and the standard output size of MD5.

📋 Factual
intermediate
2:00remaining
Collision Resistance in Hashing

Which statement best explains the concept of collision resistance in hashing algorithms like SHA and MD5?

AIt means it is impossible for two different inputs to produce the same hash output.
BIt means it is computationally infeasible to find two different inputs that produce the same hash output.
CIt means the hash output is always unique for every input without exception.
DIt means the hash function can be reversed to find the original input.
Attempts:
2 left
💡 Hint

Consider what 'computationally infeasible' means compared to 'impossible'.

🔍 Analysis
advanced
2:00remaining
Security Risks of MD5

Given that MD5 is widely considered insecure today, what is the main reason for this status?

AMD5 is vulnerable to collision attacks, allowing attackers to create different inputs with the same hash.
BMD5 hashes can be easily reversed to reveal the original input.
CMD5 hashes are too long, making them inefficient for modern systems.
DMD5 uses outdated encryption keys that can be cracked with brute force.
Attempts:
2 left
💡 Hint

Think about what collision attacks mean for hash security.

Comparison
advanced
2:00remaining
Comparing SHA-1 and SHA-256

Which of the following correctly compares SHA-1 and SHA-256 in terms of security and output size?

ASHA-1 produces a 256-bit hash and is less secure than SHA-256 which produces a 160-bit hash.
BSHA-1 produces a 160-bit hash and is more secure than SHA-256.
CSHA-1 and SHA-256 both produce 256-bit hashes but SHA-1 is faster.
DSHA-1 produces a 160-bit hash but is less secure than SHA-256, which produces a 256-bit hash.
Attempts:
2 left
💡 Hint

Recall the bit lengths and known vulnerabilities of SHA-1.

Reasoning
expert
2:00remaining
Choosing a Hashing Algorithm for Password Storage

You need to store user passwords securely in a database. Which hashing algorithm choice is best and why?

AUse SHA-256 because it is more secure than MD5 and widely used.
BUse SHA-1 because it balances speed and security well.
CUse a specialized password hashing algorithm like bcrypt or Argon2 instead of MD5 or SHA variants.
DUse MD5 because it is fast and widely supported.
Attempts:
2 left
💡 Hint

Think about what makes password hashing different from general hashing.