You need to ensure that a message that you are transmitting to another user is not altered. You decide to use a hashing algorithm. Which of the following should you implement?

A. SHA-256
B. 3DES
C. AES
D. El Gamal


A

Explanation: Of the options given, SHA-256 is the only hashing algorithm.

Computer Science & Information Technology

You might also like to view...

Identify, prioritize, and plan for the top five risks related to the system design of MyTrip presented in Chapter 6, System Design: Decomposing the System.

What will be an ideal response?

Computer Science & Information Technology

To protect themselves from lawsuits, companies do not monitor employee e-mail or other electronic communications

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is used to allocate memory for the instance variables of an object of a class?

A. the reserved word public B. the reserved word static C. the operator new D. the operator +

Computer Science & Information Technology

Tap the ____________________ keys to activate the home cell.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology