Which algorithm should you use?

You are asked to implement the hashing algorithm that uses the most bits in the calculation on
your Junos security device.

Which algorithm should you use?

You are asked to implement the hashing algorithm that uses the most bits in the calculation on
your Junos security device.

Which algorithm should you use?

A.
SHA-512

B.
SHA-256

C.
MD5-Plus

D.
MD5



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Mike

Mike

SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standardized, known as SHA-224 and SHA-384. These were also designed by the NSA.