Data Integrity Validation

Data Integrity Validation

Prev Question Next Question

Question

Which of the following is used to validate the integrity of data?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The correct answer is C. MD5.

MD5 (Message Digest 5) is a cryptographic hash function used to verify data integrity. Hash functions generate a fixed-length output, called a hash, from an input message of any size. The hash is unique to the input message, and any change to the input message will result in a different hash.

In other words, MD5 takes an input message and produces a fixed-length, unique hash value that can be used to verify that the original message has not been tampered with. This makes it a popular choice for verifying the integrity of files, passwords, and digital signatures.

CBC (Cipher Block Chaining) and Blowfish are encryption algorithms that provide confidentiality by transforming plaintext into ciphertext. RSA is a public-key cryptography algorithm that provides confidentiality and digital signatures.

While encryption algorithms provide confidentiality, they do not provide data integrity. Hash functions like MD5 are specifically designed to ensure data integrity.