Save
A-level Computer Science
Hashing algorithms and their applications
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Emeka
Visit profile
Cards (56)
What is hashing compared to in the definition?
A
blender
Why is hashing important for password storage?
It protects user
security
by hiding
passwords
What is the benefit of verifying data integrity?
It prevents unauthorized
modifications
What is the security level of SHA-256?
Secure
What is the goal of uniqueness in hashing?
Different data yields distinct
hash codes
What is one purpose of hashing algorithms?
Creating
unique identifiers
What is the hash size of MD5?
128
bits
Why is speed important in a hashing algorithm?
It processes data
efficiently
What does consistency in a hashing algorithm ensure?
Same
input
produces the
same
hash
What factors should be considered when choosing a hashing algorithm?
Security needs
Application requirements
Hash size
How does the security level of SHA-3 compare to SHA-256?
SHA-3 is
more
secure
than SHA-256
What is the hash size of SHA-3?
256-512
bits
What is a key characteristic of a good hashing algorithm?
Consistency
What might replace SHA-256 in the future?
SHA-3
What happens if a password database is compromised when using hashing?
Attackers see
hashed codes
instead of passwords
How does a good hashing algorithm handle large files?
Hashes
them quickly
What does comparing a file's hash with the original ensure?
It confirms the file's
integrity
How do websites use hashing for password storage?
They store hashed
passwords
securely
What is the hash size range for SHA-3?
256-512
bits
What are the key characteristics of a good hashing algorithm?
Consistency: Same hash for same input
Uniqueness: Minimizes
hash collisions
Speed: Efficient
data processing
Determinism: Same input yields same hash
Robustness: Resists
intentional collision attacks
How does hashing enhance password security in databases?
It prevents
access
to original
passwords
What does determinism in a hashing algorithm guarantee?
Same
input
always
results
in the same hash
What is a computational cost limitation of hashing?
Time-consuming for
large data sets
How does hashing enhance security?
By storing hashes instead of
plain text
What is the hash size of SHA-256?
256
bits
What is the purpose of hashing a document with a private key?
To create a
digital signature
What is one application of hashing?
Password storage
What does uniqueness in a hashing algorithm minimize?
Hash collisions
How does hashing provide uniqueness?
By creating unique
identifiers
for files
What does hashing ensure regarding data integrity?
Data remains unchanged during
storage
What happens when someone tries to access user accounts?
The system checks the
hashed
password
What are the advantages of hashing?
Security
: Protects passwords and sensitive data
Data Integrity
: Ensures data remains unchanged
Uniqueness: Provides unique identifiers for files
Speed
: Enables rapid hash calculations
Why are the characteristics of a good hashing algorithm important?
They ensure reliable data
identification
and
security
Why are unique identifiers useful in databases?
For
quickly
searching or
sorting
data
What is a limitation of hashing related to data retrieval?
Cannot reverse a hash to
original data
Why is MD5 considered outdated?
It is
deprecated
How does robustness contribute to data integrity?
Maintains integrity against
malicious
attempts
What are the limitations of hashing?
One-way function
: Cannot reverse a hash
Hash collisions
: Multiple inputs may produce same hash
Security issues: Weak
algorithms
can compromise security
Computational cost
: Time-consuming for large data sets
How can weak algorithms affect hashing?
They can compromise
security
What does comparing hashes help verify?
If the data remained
unchanged
See all 56 cards