COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
SHA-2 (Secure Hash Algorithm 2)
|
|
SHA-4 (Secure Hash Algorithm 4)
|
|
SHA-1 (Secure Hash Algorithm 1)
|
|
SHA-3 (Secure Hash Algorithm 3)
|
Detailed explanation-1: -SHA-3 has four cryptographic hash functions with these different digest bit lengths: SHA3-224, SHA3-256, SHA3-384, and SHA3-512, plus two extendable output functions (SHAKE-128 and SHAKE-256). In these output functions, the-128 and-256 extensions refer to the function’s security strength.
Detailed explanation-2: -SHA-3 Project A cryptographic hash algorithm (alternatively, hash “function") is designed to provide a random mapping from a string of binary data to a fixed-size “message digest” and achieve certain security properties.
Detailed explanation-3: -SHA-3 (and its variants SHA3-224, SHA3-256, SHA3-384, SHA3-512), is considered more secure than SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512) for the same hash length. For example, SHA3-256 provides more cryptographic strength than SHA-256 for the same hash length (256 bits).
Detailed explanation-4: -Division Method. Mid Square Method. Folding Method. Multiplication Method. 10-Mar-2023
Detailed explanation-5: -MD-5. This is one of the first algorithms to gain widespread approval. RIPEMD-160. The RACE Integrity Primitives Evaluation Message Digest (or RIPEMD-160) was developed in Belgium in the mid-1990s. SHA. Algorithms in the SHA family are considered slightly more secure. Whirlpool. 14-Feb-2023