Which of the following is a suitable hashing algorithm for a secure environment?

Which of the following is a suitable hashing algorithm for a secure environment?

Which of the following is a suitable hashing algorithm for a secure environment?

A.
SHA-1 because it produces 160-bits message digests.

B.
MD5 because it produces 160-bits message digests

C.
MD5 because it produces fewer numbers of collisions.

D.
RC4 because it produces 160-bits message digests



Leave a Reply 0

Your email address will not be published. Required fields are marked *