Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers hashing, specifically integrity. In this concept, we are trying to get a guarantee that the information has not been modified. Hashing is a digital representation of a file and if the file changes, the hashing changes. Hashing algorithms include: • MD-5 • SHA-1 160 • SHA-256 • RipeMD, Tiger, Whirlpool and HAVAL are lesser known but still used