350-701 · Question #293
350-701 Question #293: Real Exam Question with Answer & Explanation
The correct answer is D: SHA-2. NGE was created to define a widely accepted and consistent set of cryptographic algorithms that provide strong security and good performance for our customers. An algorithm that would be secure even after a quantum-computer is built is said to have postquantum security or be quan
Question
Which algorithm is an NGE hash function?
Options
- AHMAC
- BSHA-1
- CMD5
- DSHA-2
Explanation
NGE was created to define a widely accepted and consistent set of cryptographic algorithms that provide strong security and good performance for our customers. An algorithm that would be secure even after a quantum-computer is built is said to have postquantum security or be quantum-computer resistant (QCR). AES-256, SHA-384 and SHA-512 are believed to be postquantum secure. SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hash algorithms around. A cryptographic hash, also often referred to as a “digest”, “fingerprint” or “signature”, is an almost perfectly unique string of characters that is generated from a separate piece of input text. SHA-256 generates a 256-bit (32-byte) signature. https://blogs.cisco.com/security/cisco-next-generation-encryption-and-postquantum-cryptography
Topics
Community Discussion
No community discussion yet for this question.