ECCouncil Exam Questions

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored? (Choose the best answer)

A.
symmetric algorithms

B.
asymmetric algorithms

C.
hashing algorithms

D.
integrity algorithms

Explanation:
In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. A hash function takes a long string (or ‘message’) of any length as input and produces a fixed length string as output, sometimes termed a message digest or a digital fingerprint.