Page 397 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 397
algorithm.
Chapter 7 provides details on contemporary hashing algorithms and
explains how they are used to provide digital signature capability,
which helps meet the cryptographic goals of integrity and
nonrepudiation.