GSEC Exam QuestionsBrowse all questions from this exam

GSEC Exam - Question 6


When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to

PGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?

Show Answer
Correct Answer: C

Pretty Good Privacy (PGP) uses cryptographic hash algorithms to create digital signatures, ensuring the authenticity and integrity of a message. Among the hash algorithms utilized by PGP, SHA-1 (Secure Hash Algorithm 1) is one of the commonly used options. SHA-1 generates a unique fixed-size 160-bit hash value from an input message, which forms a critical part of the digital signature process.

Discussion

1 comment
Sign in to comment
arvkv
Sep 17, 2024

A) Blowfish - This is a symmetric encryption algorithm, not a hash. B) DES - This is a symmetric encryption algorithm, not a hash. C) SHA-1 - Correct. SHA-1 is a secure cryptographic hash algorithm used by PGP. D) Cast - This is a symmetric encryption algorithm, not a commonly used hash. Therefore, the correct option is C.