Questions
Now it's time to check your knowledge. Select the best response, then check the answers in the Assessment section at the end of the book:
- When generating a hash, we create a message _____, which is used to ensure data integrity.
a. chain
b. digest
c. key
d. collision
- During the digital signature process, the message digest is then encrypted using the sender's private key, which then becomes a(n) _____.
a. key
b. collision
c. smart card
d. HMAC
- Today, there are billions of devices on the Internet of Things (IoT). The data generated by IoT devices is called _____ data.
a. big
b. key
c. Rivest
d. collision
- A hash algorithm should be _____; this means that the algorithm will produce the same hash each and every time the algorithm is run on a given block of data.
a. ElGamal
b. round
c. deterministic
d. Galois
- Ronald _____ designed the aptly named message digest algorithm, which had several versions in the early 1990s.
a. Rivest
b. Enigma
c. ElGamal
d. Rijndael...