A _________ protects against an attack in which one party generates a message for another party to sign.

A. data authenticator
B. strong hash function
C. weak hash function
D. digital signature


B. strong hash function

Computer Science & Information Technology

You might also like to view...

Most peripherals are connected through USB ports

Indicate whether the statement is true or false

Computer Science & Information Technology

Alice 3 provides an installation wizard for Windows and MacOS systems.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

With ____ web publishing, the HTML document is a snapshot of the data.

A. dynamic B. optimized C. extensible D. static

Computer Science & Information Technology

Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be.This process of providing proof is known as ____.

A. authorization B. encryption C. cryptography D. authentication

Computer Science & Information Technology