An authentication algorithm
consists
Answers
Answered by
5
Answer:
Authentication algorithms produce an integrity checksum value or digest that is based on the data and a key. The man pages for authentication algorithms describe the size of both the digest and key. The following table lists the authentication algorithms that are supported in the Solaris operating system.
Explanation:
Similar questions