COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
You’ve received an assortment of files along with accompanying hashes to guarantee integrity. Some of the hash values are 256-bit and some are 512-bit. Assuming they all use the same basic algorithm, what might it be?
|
MD5
|
|
RIPEMD
|
|
SHA-1
|
|
SHA-2
|
Explanation:
Detailed explanation-1: -Generally, the basic security of cryptographic hash functions can be seen from different angles: pre-image resistance, second pre-image resistance, collision resistance, and pseudo-randomness.
Detailed explanation-2: -Secure KDF-Based Password Hashing-Recommended The most complicated and most secure method for secure password storage and password-based authentication is to use secure KDF-based password hash, written in the database as pair salt + KDF(password, salt) .
Detailed explanation-3: -To improve the safety of your hashing algorithm, you can also use security techniques such as salting, where you add a “salt value, ‘’ or a set of random characters, to the password before hashing it.
There is 1 question to complete.