Last Updated on December 25, 2021 by Admin 2
A message is being sent with a hash. The risk of an attacker changing the message and generating an authentic hash value can be mitigated by:
- using a secret key in conjunction with the hash algorithm
- requiring the recipient to use a different hash algorithm
- using the sender’s public key to encrypt the message
- generating hash output that is the same size as the original message