A message is being sent with a hash. The risk of an attacker changing the message and generating an authentic hash value can be mitigated by:

Last Updated on December 25, 2021 by Admin 2

A message is being sent with a hash. The risk of an attacker changing the message and generating an authentic hash value can be mitigated by:

  • using a secret key in conjunction with the hash algorithm
  • requiring the recipient to use a different hash algorithm
  • using the sender’s public key to encrypt the message
  • generating hash output that is the same size as the original message
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments