Hashing algorithms are specifically designed to ensure data integrity. A hash function takes an input and returns a fixed-length string, called a hash or message digest. Even a small change in the input results in a completely different hash, making it useful for detecting tampering.
Common hashing algorithms include:
MD5 (now obsolete for secure uses)
SHA-1, SHA-2, SHA-3
HMAC (Hashed Message Authentication Code)
From CEH v13 Courseware:
Module 20: Cryptography
Topic: Hash Functions and Data Integrity
CEH v13 Study Guide states:
“Hashing algorithms provide integrity by generating a unique digital fingerprint of data. Any alteration in the message content will result in a different hash value, indicating that the integrity has been compromised.”
Incorrect Options:
A: Symmetric algorithms provide confidentiality.
B: Asymmetric algorithms provide confidentiality and authentication.
D: "Integrity algorithms" is not a formal cryptographic term.
[Reference:CEH v13 Study Guide – Module 20: Cryptographic Hash FunctionsNIST FIPS 180-4 – Secure Hash Standard (SHS), ======, , ]
Submit