Total Questions : 20
Expected Time : 20 Minutes

1. What is the role of a 'seed' in hash functions, particularly in cryptographic hashing?

2. What role does the 'prime number' play in some hash function implementations?

3. What is the significance of 'collision resistance' in cryptographic hashing?

4. How does 'rainbow table' attacks relate to the security of hash functions?

5. How does 'double hashing' differ from other collision resolution techniques?

6. What role does 'KDF (Key Derivation Function)' play in strengthening hash functions for secure key storage?

7. How does 'universal hashing' contribute to the security of hash functions?

8. What is the primary purpose of 'post-quantum hash functions' in the context of quantum computing?

9. What is the significance of 'HMAC (Hash-based Message Authentication Code)' in hash function applications?

10. How does 'collision resistance' relate to the security of hash functions?

11. How does the choice of hash function impact the efficiency of a hash table?

12. How does 'Merkle–Damgård construction' contribute to the design of secure hash functions?

13. What is the purpose of a 'universal hash function'?

14. How does 'collision entropy' relate to the security of hash functions?

15. How does 'Bloom filter' use hashing for efficient data retrieval?

16. How does 'birthday paradox' relate to hash functions?

17. What is the significance of 'hash length extension attacks' in cryptographic hash functions?

18. What is the purpose of the 'hash code' generated by a hash function?

19. What is the main advantage of using a hash table for data storage?

20. Why is it important to choose a hash function with low collision rates?