A software developer utilizes cryptographic functions to generate codes that verify message integrity. Due to the nature if the data that is being sent back and forth from the client application to the server, the developer would like to change the cryptographic function to one that verities both authentication and message integrity. Which of the following algorithms should the software developer utilize?

A. HMAC
B. SHA
C. Two Fish
D. RIPEMD


Answer: D. RIPEMD

Computer Science & Information Technology

You might also like to view...

How fast is a gigahertz?

A) 1 billion electrical vibrations per second B) 1 million electrical vibrations per second C) 1 quadrillion electrical vibrations per second D) 1 trillion electrical vibrations per second

Computer Science & Information Technology

The default printer is indicated by a green square

Indicate whether the statement is true or false

Computer Science & Information Technology

When creating an Excel document, you should avoid using _____ text and background together, since this is the most common form of color blindness.

A. red and green B. yellow and blue C. black and white D. red and yellow

Computer Science & Information Technology

Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.

A. Counterfeit software B. Pirated software C. Ethical software D. Governance software

Computer Science & Information Technology