COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following cryptographic hash functions is the least vulnerable to attacks?
A
SHA-1
B
RIPEMD
C
SHA-512
D
MD5
Explanation: 

Detailed explanation-1: -Which of the following cryptographic hash functions is the least vulnerable to attacks? SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words.

Detailed explanation-2: -Types of cryptography Asymmetric cryptography uses two keys: if you encrypt with one key, you may decrypt with the other. Hashing is a one-way cryptographic transformation using an algorithm (and no key).

Detailed explanation-3: -Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.

There is 1 question to complete.