Computer Science, asked by sunnyka8603, 1 year ago

Illustrate the variety of ways in which n hash code can be used to provide message authentication

Answers

Answered by Anonymous
0

Illustrate variety of ways in which hash code can be used to provide message authentication. 2. Only the hash code is encrypted, using symmetric encryption.

Similar questions