0
0
Cybersecurityknowledge~5 mins

Hashing algorithms (SHA, MD5) in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is a hashing algorithm?
A hashing algorithm is a process that takes input data and converts it into a fixed-size string of characters, which appears random. This output is called a hash and is unique to the original data.
Click to reveal answer
beginner
What does MD5 stand for and what is it used for?
MD5 stands for Message Digest 5. It is a hashing algorithm used to create a 128-bit hash value, often used to check data integrity but is now considered insecure for cryptographic purposes.
Click to reveal answer
intermediate
What is SHA and how is it different from MD5?
SHA stands for Secure Hash Algorithm. It produces longer hash values (like 160-bit or more) and is more secure than MD5, making it better for protecting data against tampering.
Click to reveal answer
intermediate
Why are MD5 and SHA hashes considered one-way functions?
Because once data is hashed, it is practically impossible to reverse the process and get the original data back. This one-way property helps protect sensitive information.
Click to reveal answer
advanced
What is a collision in hashing algorithms?
A collision happens when two different inputs produce the same hash output. This is a weakness because it can allow attackers to trick systems that rely on unique hashes.
Click to reveal answer
What is the main purpose of a hashing algorithm?
ATo convert data into a fixed-size unique string
BTo encrypt data so it can be decrypted later
CTo compress data to save space
DTo generate random numbers
Which hashing algorithm is considered less secure today?
ASHA-3
BSHA-1
CSHA-256
DMD5
What does a collision in hashing mean?
ATwo inputs produce the same hash
BHash cannot be generated
CHash is too long
DHash is reversible
Which property makes hashing algorithms useful for passwords?
AThey are reversible
BThey are one-way functions
CThey produce random outputs
DThey compress data
SHA stands for:
ASecure Hacking Algorithm
BSimple Hash Application
CSecure Hash Algorithm
DStrong Hash Access
Explain what a hashing algorithm does and why it is important in cybersecurity.
Think about how data is transformed and why reversing it is hard.
You got /4 concepts.
    Compare MD5 and SHA in terms of security and usage.
    Consider their strength against attacks and common applications.
    You got /4 concepts.