NETWORK SECURITY
DIGITAL SIGNATURE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
SHA and MD5 are examples of:
|
symmetric block ciphers
|
|
Asymmetric block ciphers
|
|
Stream ciphers
|
|
Message signing algorithms
|
Explanation:
Detailed explanation-1: -Both MD5 and SHA1 are hashing algorithms.
Detailed explanation-2: -The MD5 (message-digest algorithm) hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.
Detailed explanation-3: -MD5 (Message Digest Method 5) is a cryptographic hash algorithm used to generate a 128-bit digest from a string of any length. It represents the digests as 32 digit hexadecimal numbers. Ronald Rivest designed this algorithm in 1991 to provide the means for digital signature verification.
There is 1 question to complete.