A cryptographic hash function is used to ensure data integrity. It generates a fixed-length output (digest) from any size of input data. If the data is modified in any way, the resulting hash will change. This allows systems to detect data tampering, ensuring that the data remains unaltered from its original form.
Reference – CEH v13 Official Study Guide:
Module 20: Cryptography
Quote:
“Hash functions are used to ensure the integrity of a message or file by producing a unique digest that changes if the data is modified.”
Incorrect Options:
A. Authentication ensures identity, not data integrity.
B. Confidentiality is achieved via encryption, not hashing.
C. Availability pertains to system uptime and accessibility, not hashes.
=
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit