When generating a request for a new x.509 certificate for securing a website, which of the
following is the MOST appropriate hashing algorithm?
A.
RC4
B.
MD5
C.
HMAC
D.
SHA
When generating a request for a new x.509 certificate for securing a website, which of the
following is the MOST appropriate hashing algorithm?
When generating a request for a new x.509 certificate for securing a website, which of the
following is the MOST appropriate hashing algorithm?
A.
RC4
B.
MD5
C.
HMAC
D.
SHA
D.
The most popular certificate used is the X.509 version 3. X.509 is a standard certificate format supported by the International Telecommunications Union (ITU) and many other standard organizations. Adopting a standard certificate format is important for systems to be assured of interoperability in a certificate-oriented environment. Notice that the certificate contains identifiers of two different algorithms used in the process. The signature algorithm is Md2RSA, and the digital signature algorithm is SHA1 (SHA). The certificate alos has a unique serial number issued by the CA.
The correct aanswer is choice D, SHA.
Agree with SHA
agree, SHA is mopre secure MD5 was broken. answer is D