COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Give the three types of cryptographic hash functions.
A
SHA-2 (Secure Hash Algorithm 2)
B
SHA-4 (Secure Hash Algorithm 4)
C
SHA-1 (Secure Hash Algorithm 1)
D
SHA-3 (Secure Hash Algorithm 3)
Explanation: 

Detailed explanation-1: -SHA-3 has four cryptographic hash functions with these different digest bit lengths: SHA3-224, SHA3-256, SHA3-384, and SHA3-512, plus two extendable output functions (SHAKE-128 and SHAKE-256). In these output functions, the-128 and-256 extensions refer to the function’s security strength.

Detailed explanation-2: -SHA-3 Project A cryptographic hash algorithm (alternatively, hash “function") is designed to provide a random mapping from a string of binary data to a fixed-size “message digest” and achieve certain security properties.

Detailed explanation-3: -SHA-3 (and its variants SHA3-224, SHA3-256, SHA3-384, SHA3-512), is considered more secure than SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512) for the same hash length. For example, SHA3-256 provides more cryptographic strength than SHA-256 for the same hash length (256 bits).

Detailed explanation-4: -Division Method. Mid Square Method. Folding Method. Multiplication Method. 10-Mar-2023

Detailed explanation-5: -MD-5. This is one of the first algorithms to gain widespread approval. RIPEMD-160. The RACE Integrity Primitives Evaluation Message Digest (or RIPEMD-160) was developed in Belgium in the mid-1990s. SHA. Algorithms in the SHA family are considered slightly more secure. Whirlpool. 14-Feb-2023

There is 1 question to complete.