You need to ensure that a message that you are transmitting to another user is not altered. You decide to use a hashing algorithm. Which of the following should you implement?
A. SHA-256
B. 3DES
C. AES
D. El Gamal
A
Explanation: Of the options given, SHA-256 is the only hashing algorithm.
You might also like to view...
Identify, prioritize, and plan for the top five risks related to the system design of MyTrip presented in Chapter 6, System Design: Decomposing the System.
What will be an ideal response?
To protect themselves from lawsuits, companies do not monitor employee e-mail or other electronic communications
Indicate whether the statement is true or false
Which of the following is used to allocate memory for the instance variables of an object of a class?
A. the reserved word public B. the reserved word static C. the operator new D. the operator +
Tap the ____________________ keys to activate the home cell.
Fill in the blank(s) with the appropriate word(s).