Recall & Review
beginner
What is a hashing algorithm?
A hashing algorithm is a process that takes input data and converts it into a fixed-size string of characters, which appears random. This output is called a hash and is unique to the original data.
Click to reveal answer
beginner
What does MD5 stand for and what is it used for?
MD5 stands for Message Digest 5. It is a hashing algorithm used to create a 128-bit hash value, often used to check data integrity but is now considered insecure for cryptographic purposes.
Click to reveal answer
intermediate
What is SHA and how is it different from MD5?
SHA stands for Secure Hash Algorithm. It produces longer hash values (like 160-bit or more) and is more secure than MD5, making it better for protecting data against tampering.
Click to reveal answer
intermediate
Why are MD5 and SHA hashes considered one-way functions?
Because once data is hashed, it is practically impossible to reverse the process and get the original data back. This one-way property helps protect sensitive information.
Click to reveal answer
advanced
What is a collision in hashing algorithms?
A collision happens when two different inputs produce the same hash output. This is a weakness because it can allow attackers to trick systems that rely on unique hashes.
Click to reveal answer
What is the main purpose of a hashing algorithm?
✗ Incorrect
Hashing algorithms convert data into a fixed-size string called a hash, which uniquely represents the original data.
Which hashing algorithm is considered less secure today?
✗ Incorrect
MD5 is considered less secure due to vulnerabilities that allow collisions.
What does a collision in hashing mean?
✗ Incorrect
A collision occurs when two different inputs produce the same hash output.
Which property makes hashing algorithms useful for passwords?
✗ Incorrect
Hashing algorithms are one-way, meaning original data cannot be recovered from the hash, protecting passwords.
SHA stands for:
✗ Incorrect
SHA stands for Secure Hash Algorithm, a family of cryptographic hash functions.
Explain what a hashing algorithm does and why it is important in cybersecurity.
Think about how data is transformed and why reversing it is hard.
You got /4 concepts.
Compare MD5 and SHA in terms of security and usage.
Consider their strength against attacks and common applications.
You got /4 concepts.