COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following are hashing algorithms?Choose all that apply.
A
MD5
B
RIPEMD
C
Bcrypt
D
HMAC
E
SHA
Explanation: 

Detailed explanation-1: -SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and used for hashing data and certificates. A hashing algorithm shortens the input data into a smaller form that cannot be understood by using bitwise operations, modular additions, and compression functions.

Detailed explanation-2: -The SHA (Secure Hash Algorithm) Family designates a family of six different hash functions: SHA-0, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 [7, 8]. They take variable length input messages and hash them to fixed-length outputs.

Detailed explanation-3: -MD4d. MD5Answer options C and D are correct. MD4 and MD5 are the hashing algorithms thatmake use of padding to ensure that the message length is 64 bits smaller than a multipleof 512 bits.

There is 1 question to complete.