Which of the following algorithms would meet the requirement?
seenagape
A security administrator implements a web server that utilizes an algorithm that requires other hashing standards to provide data integrity. Which of the following algorithms would meet the requirement?