--%>

Hash algorithm

Write out any three hash algorithm.

E

Expert

Verified

Hash Algorithm is considered as:

a) MD5 (Message Digest version 5) algorithm.

b) SHA_1 (Secure Hash Algorithm).

c) RIPEMD_160 algorithm.

   Related Questions in Computer Network Security

  • Q : Sub Word and Sub Bytes Explain

    Explain difference between the Sub Word and Sub Bytes?

  • Q : Competition matrix-Michael Porters

    The competition matrix is a term used while talking about strategy development, first used by Michael E. Porter 1983. They tell about product politics in marketing for individual business fields of an enterprise to gain competition advantage. In this,

  • Q : Address allocation and flow mapping

    Any questions that are completed should be explained and given a general reason to why that strategy was used. Address allocation is already done and flow mapping is already completed. I just need Q2, Q4, Q5, Q6, Q7, Q8, Q9 answered.  

  • Q : General LAN Security setup General LAN

    General LAN Security setup: There are certain methods which can be used as general security such as not connecting the wireless network directly to SAMS network. The SSID should be changes on regular basis. After installation of the network the defaul

  • Q : Advantages of ReefEdge technology

    Advantages of ReefEdge technology: The advantages of using the ReefEdge technology by an organization are listed below: The system captures the identity of the user who is going to use the system. Therefore the acc

  • Q : Steps for preparing envelope data MIME

    Specify the steps used for preparing the envelope data MIME?

  • Q : What is Add Round Key What is meant by

    What is meant by the term Add Round Key.

  • Q : What is Service set id or SSID-LAN

    SSID (Service set id): SSID is an identifier of the users of the network. SSID acts as a password and it is of 32 characters. The users in the particular network need to know the SSID. Since only users have the 32 SSID, the attackers cannot access the

  • Q : Operations in Blowfish Explain the

    Explain the primitive operations which are used in the Blowfish?

  • Q : Mono-alphabetic and Playfair cipher

    Define: a) Mono-alphabetic cipher b) Playfair cipher c) Transposition cipher