Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored? (Choose the best answer)

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored? (Choose the best answer)

A.
symmetric algorithms

B.
asymmetric algorithms

C.
hashing algorithms

D.
integrity algorithms

Explanation:
In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. A hash function takes a long string (or ‘message’) of any length as input and produces a fixed length string as output, sometimes termed a message digest or a digital fingerprint.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Cie

Cie

Asymmetric algorithm is using public and private key which the private key can be used to for digital signature to guarantee message integrity. Why not B ?