Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). There are many different types of hashing functions. For example, md5, sha1, sha256, sha384, and sha512. Different mathematical calculations result in stronger hash values. The strongest of these hash values listed is the sha512, and the weakest is the md5. Although weaker than the others, the md5 hash is still accepted in court for testimony. As the number of files continues to increase, larger hash values ensure even more reliability than older ones that were used.
There are five types of hashing algorithms. Write a 300-word explanation of each type of hashing algorithm.
The written portion must contain sufficient information to adequately address the questions and be free from grammar and spelling errors. The paper should be provided in APA format.