Which of the following is assured by the u
se of a hash?
A. Integrity
B. Confidentiality
C. Authentication
D. Availability
An important application of secure hashes is verification of message integrity. Determining whether any changes have been made to a message (or a file), for example
, can be accomplished by comparing message digests calculated before, and after, transmission (or any other event).
References: