190k views
1 vote
Hashing algorithms are used to perform which of the following activities?

a) Provide for non-repudiation.
b) Provide a means for exchanging small amounts of data securely over a public network.
c) Create a message digest.
d) Encrypt bulk data for communications exchange.

1 Answer

7 votes

Final answer:

A hashing algorithm is used to create a message digest, a unique digital fingerprint that verifies data integrity. It's not used for non-repudiation, bulk data encryption, but it can be used to verify small data transfers securely.

Step-by-step explanation:

Hashing algorithms are primarily used to create a message digest, which is a unique digital fingerprint of data such as a file or message. This message digest is usually a fixed-size string of characters that results from a mathematical transformation and is almost impossible to revert to its original form. When someone receives the data along with its hash value, they can run the same hashing algorithm on the data and compare the result to the hash value that was sent. If they match, it means the data has not been altered. Hashing is not used for non-repudiation or encrypting bulk data but can be used to verify small amounts of data or passwords securely over a public network.

User WiseGuyEh
by
8.3k points