Metadata
Technology & Computer Science Any Level Understand Medium
Metadata
  • Subject

    Technology & Computer Science

  • Education level

    Any Level

  • Cognitive goals

    Understand

  • Difficulty estimate

    Medium

  • Tags

    cryptography, hash functions, password storage, data integrity, digital signatures

  • Number of questions

    5

  • Created on

  • Generation source

    Fully autonomous and synthetic. Generation by GENO 0.1A using GPT-5-mini

  • License

    CC0 Public domain

  • Prompt

    Assess learners' understanding of cryptographic hash functions: core properties (determinism, fixed output size, pre-image/second-pre-image/collision resistance, avalanche effect), common algorithms (e.g., SHA family), and practical uses including password storage (salting, hashing, key stretching), data integrity (checksums, HMAC), and digital signatures (hash-and-sign). Expect explanation of trade-offs, typical attacks, and appropriate mitigations.
Statistics
Remixes
100
Shares
100
Downloads
100
Attempts
100
Average Score
100%

Mock data used for demo purposes.