COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following cryptographic hash functions is the least vulnerable to attacks?
|
SHA-1
|
|
RIPEMD
|
|
SHA-512
|
|
MD5
|
Explanation:
Detailed explanation-1: -Which of the following cryptographic hash functions is the least vulnerable to attacks? SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words.
Detailed explanation-2: -Types of cryptography Asymmetric cryptography uses two keys: if you encrypt with one key, you may decrypt with the other. Hashing is a one-way cryptographic transformation using an algorithm (and no key).
Detailed explanation-3: -Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.
There is 1 question to complete.