Matt, a forensic analyst, wants to obtain the digital fingerprint for a given message. The message is 160-bits
long. Which of the following hashing methods would Matt have to use to obtain this digital fingerprint?
The Secure Hash Algorithm (SHA) was designed to ensure the integrity of a message. SHA is a one-way hash
that provides a hash value that can be used with an encryption protocol. This algorithm produces a 160-bit hash
value. SHA (1 or 2) is preferred over Message Digest Algorithm.