For organizations worried about extremely resourceful hackers, a more powerful hashing algorithm such as SHA2 should be implemented with the certificate. Although difficult, X.509 certificates that use MD5 and SHA1 hashes can be compromised. Today’s implementations will focus on Secure Hash Algorithm (SHA) 2 algorithms. As a note, SHA 256, SHA 384, and SHA 512 are known as SHA 2. Common hashing algorithms you will see for X-509 certificate hashing are SHA 256, SHA 384, SHA 512, and MD5. SHA-1 appears to be more secure than MD5 in many regards.
https://adamtheautomator.com/x-509-certificate-tutorial/
http://www.differencebetween.net/technology/difference-between-sha-and-md5/
HMAC is authentication that uses hash functions like SHA. It is not a hash itself.
upvoted 9 times
...
...
This section is not available anymore. Please use the main Exam Page.SY0-501 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MelvinJohn
Highly Voted 5 years, 3 months agoDon_H
Most Recent 4 years, 9 months agoNot_My_Name
4 years, 7 months agosilentnotifications
4 years, 6 months ago