COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You’ve received an assortment of files along with accompanying hashes to guarantee integrity. Some of the hash values are 256-bit and some are 512-bit. Assuming they all use the same basic algorithm, what might it be?
A
MD5
B
RIPEMD
C
SHA-1
D
SHA-2
Explanation: 

Detailed explanation-1: -Generally, the basic security of cryptographic hash functions can be seen from different angles: pre-image resistance, second pre-image resistance, collision resistance, and pseudo-randomness.

Detailed explanation-2: -Secure KDF-Based Password Hashing-Recommended The most complicated and most secure method for secure password storage and password-based authentication is to use secure KDF-based password hash, written in the database as pair salt + KDF(password, salt) .

Detailed explanation-3: -To improve the safety of your hashing algorithm, you can also use security techniques such as salting, where you add a “salt value, ‘’ or a set of random characters, to the password before hashing it.

There is 1 question to complete.