Matt, a forensic analyst, wants to obtain the digital fingerprint for a given message. The message
is 160-bits long. Which of the following hashing methods would Matt have to use to obtain this
digital fingerprint?
 
A.
 SHA1
B.
 MD2
C.
 MD4
D.
 MD5
Explanation:
The Secure Hash Algorithm (SHA) was designed to ensure the integrity of a message. SHA is a
one-way hash that provides a hash value that can be used with an encryption protocol. Thisalgorithm produces a 160-bit hash value. SHA (1 or 2) is preferred over Message Digest
Algorithm.
 
                