COMPUTER NETWORKING

NETWORK SECURITY

DIGITAL SIGNATURE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
SHA and MD5 are examples of:
A
symmetric block ciphers
B
Asymmetric block ciphers
C
Stream ciphers
D
Message signing algorithms
Explanation: 

Detailed explanation-1: -Both MD5 and SHA1 are hashing algorithms.

Detailed explanation-2: -The MD5 (message-digest algorithm) hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.

Detailed explanation-3: -MD5 (Message Digest Method 5) is a cryptographic hash algorithm used to generate a 128-bit digest from a string of any length. It represents the digests as 32 digit hexadecimal numbers. Ronald Rivest designed this algorithm in 1991 to provide the means for digital signature verification.

There is 1 question to complete.