Certified in Risk and Information Systems Control (CRISC) Practice Test

Image Description

Question: 1 / 400

Which hashing algorithms are commonly used to create a message digest for digital signatures?

RSA and AES

SHA1 and MD5

The use of hashing algorithms like SHA1 and MD5 to create a message digest for digital signatures is based on their ability to convert input data into a fixed-length string, which serves as a unique representation of the original data. These algorithms are specifically designed for generating message digests that maintain integrity, meaning any alteration to the original message will result in a different hash, thereby signaling tampering.

In digital signatures, the message digest is often generated from the original message and then encrypted with a private key, forming the signature. This process ensures that the integrity of the message can be verified, as the recipient can generate the digest again and compare it to the decrypted signature. SHA1, while not recommended for strong security due to vulnerabilities discovered over time, was widely used for this purpose. MD5 also had similar use but is now generally considered weak against collision attacks.

The other options involve algorithms not suited for hashing specifically for digital signatures. RSA and AES are encryption algorithms, while DES and Blowfish are symmetric encryption algorithms that do not generate message digests. WPA2 is a security protocol for wireless networks, and TLS is a cryptographic protocol for secure communications; neither are focused on hashing as message digests for signatures.

Get further explanation with Examzify DeepDiveBeta

DES and Blowfish

WPA2 and TLS

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy