SHA-1属于 。A.加密算法B.签名算法C.消息完整性算法D.身份认证算法
SHA-1属于 。
A.加密算法
B.签名算法
C.消息完整性算法
D.身份认证算法
参考答案和解析
数字签名
相关考题:
Which of the following statements are true regardinghashing? ()A、 MD5 produces a 160-bit result.B、 SHA-256 is an extension to SHA-1 with a longer output.C、 MD5 takes more CPU cycles to compute than SHA-1.D、 Changing1 bit of the input to SHA-1 changes 1 bit of the output.E、 SHA-1 is stronger than MD5 because it can be used with a key to prevent modification.
Which algorithm was the first to be found suitable for both digital signing and encryption?()A、HMACB、RSAC、MD5D、SHA-1
Why is ProtecTIER’s HyperFactor technology superior to Data Domain’s hash-based deduplicationalgorithms?()A、it has only a single stage data inspection processB、it utilizes industry standard SHA-1 and MD5 algorithmsC、it looks for identical matches comparing chunks of dataD、it first looks for similarity of data rather than exact matching
单选题Why is ProtecTIER’s HyperFactor technology superior to Data Domain’s hash-based deduplicationalgorithms?()Ait has only a single stage data inspection processBit utilizes industry standard SHA-1 and MD5 algorithmsCit looks for identical matches comparing chunks of dataDit first looks for similarity of data rather than exact matching
多选题Which of the following statements are true regardinghashing? ()AMD5 produces a 160-bit result.BSHA-256 is an extension to SHA-1 with a longer output.CMD5 takes more CPU cycles to compute than SHA-1.DChanging1 bit of the input to SHA-1 changes 1 bit of the output.ESHA-1 is stronger than MD5 because it can be used with a key to prevent modification.
单选题SHA-1生成的消息摘要比MD5生成的消息摘要长多少位()A32位B64位C16位D8位