Public-key encryption is based on a ____.
A. message authentication code (MAC)
B. certificate
C. hash value
D. key
Answer: C
Computer Science & Information Technology
You might also like to view...
When Calc is open, you can use the shortcut key Ctrl+c to create a new worksheet
Indicate whether the statement is true or false
Computer Science & Information Technology
The network interface layer of the TCP/IP model defines how the host connects to which network?
What will be an ideal response?
Computer Science & Information Technology