You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?
Answers
Answered by
1
You should select SHA-256 hash algorithm
The initial version of the SHA-256 algorithm was created by the US National Security Agency. SHA-256 is a member of the SHA-2 cryptographic hash functions . SHA stands for Secure Hash Algorithm. The Sha-256 algorithm is based on the Merkle-Damgard construction method, according to which the initial index is divided into blocks immediately after the change is made, and those, in turn, into 16 words. This Protocol works with information broken down into pieces of 64 bytes.
Similar questions