Exam GSEC All QuestionsBrowse all questions from this exam
Question 6

When using Pretty Good Privacy (PGP) to digitally sign a message, the signature is created in a two-step process. First, the message to be signed is submitted to

PGP's cryptographic hash algorithm. What is one of the hash algorithms used by PGP for this process?

    Correct Answer: C

    Pretty Good Privacy (PGP) uses cryptographic hash algorithms to create digital signatures, ensuring the authenticity and integrity of a message. Among the hash algorithms utilized by PGP, SHA-1 (Secure Hash Algorithm 1) is one of the commonly used options. SHA-1 generates a unique fixed-size 160-bit hash value from an input message, which forms a critical part of the digital signature process.

Discussion
arvkvOption: C

A) Blowfish - This is a symmetric encryption algorithm, not a hash. B) DES - This is a symmetric encryption algorithm, not a hash. C) SHA-1 - Correct. SHA-1 is a secure cryptographic hash algorithm used by PGP. D) Cast - This is a symmetric encryption algorithm, not a commonly used hash. Therefore, the correct option is C.