Message authentication is achieved using a __________ .

A. DES
B. MDF
C. SHA
D. MAC


D. MAC

Computer Science & Information Technology

You might also like to view...

Briefly describe the main characteristics of the Trojan AIDS.

What will be an ideal response?

Computer Science & Information Technology

What is the difference between the *.fla file, the *xfl file, and a *.swf file, and how do you create them?

What will be an ideal response?

Computer Science & Information Technology

The default Normal style includes the Times New Roman font, 10 pt font size, and 0 pt spacing after a paragraph

Indicate whether the statement is true or false

Computer Science & Information Technology

____________________ operations allow us to alter the normal sequential flow of control in an algorithm.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology