The security of any MAC function based on an embedded hash function depends in some way on the _________ strength of the underlying hash function.
Fill in the blank(s) with the appropriate word(s).
SHA-3
Computer Science & Information Technology
You might also like to view...
A company is building a two-tier web application to serve dynamic transaction-based content. The data tier is leveraging an Online Transactional Processing (OLTP) database. What services should you leverage to enable an elastic and scalable web tier?
A. Elastic Load Balancing, Amazon EC2, and Auto Scaling B. Elastic Load Balancing, Amazon RDS with Multi-AZ, and Amazon S3 C. Amazon RDS with Multi-AZ and Auto Scaling D. Amazon EC2, Amazon DynamoDB, and Amazon S3
Computer Science & Information Technology
Which of the following is NOT an alternative to using CBA to justify risk controls?
A. benchmarking B. due care and due diligence C. selective risk avoidance D. the gold standard
Computer Science & Information Technology