A security administrator implements a web server that utilizes an algorithm that requires other hashing standards to provide data integrity. Which of the following algorithms would meet the requirement?
A. SHA
B. MD5
C. RIPEMD
D. HMAC
4 Comments on “Which of the following algorithms would meet the requirement?”
Lakesays:
Correct answer is A, not D.
SHA stands for “secure hash algorithm”. SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely used applications and protocols including TLS and SSL, PGP, SSH, S/MIME, and IPsec. It is used to ensure data integrity.
You cannot configure your browser to use HMAC to secure communication.
A keyed-hash message authentication code (HMAC) is a specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret cryptographic key. As with any MAC, it may be used to simultaneously verify both the data integrity and the authentication of a message.
0
0
Nirmalasays:
if needs to provide message integrity and authentication then HMAC-SHA2 is used
0
0
testersays:
the key words here are “algorithm that requires other
hashing standards to provide data integrity” and that is HMAC, because HMAC uses MD5 or SHA to provide integrity.
I go with D
0
0
captcavemansays:
The answer is D. HMAC
TLS uses HMAC. If you don’t believe me then sniff the wire between you and a webserver using whatever web browser. You will find it listed in the cipher suite list within the client hello message.
Correct answer is A, not D.
SHA stands for “secure hash algorithm”. SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely used applications and protocols including TLS and SSL, PGP, SSH, S/MIME, and IPsec. It is used to ensure data integrity.
You cannot configure your browser to use HMAC to secure communication.
A keyed-hash message authentication code (HMAC) is a specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret cryptographic key. As with any MAC, it may be used to simultaneously verify both the data integrity and the authentication of a message.
0
0
if needs to provide message integrity and authentication then HMAC-SHA2 is used
0
0
the key words here are “algorithm that requires other
hashing standards to provide data integrity” and that is HMAC, because HMAC uses MD5 or SHA to provide integrity.
I go with D
0
0
The answer is D. HMAC
TLS uses HMAC. If you don’t believe me then sniff the wire between you and a webserver using whatever web browser. You will find it listed in the cipher suite list within the client hello message.
0
0