The appeal of __________ is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of this form of authentication.
A. MAC
B. HMAC
C. GMAC
D. CMAC
B. HMAC
Computer Science & Information Technology
You might also like to view...
Which term is used for a message in its original format?
A. Encryption B. Decryption C. Ciphertext D. Plaintext
Computer Science & Information Technology
Which tab in Task Manager is used to determine if more RAM is needed?
a. Applications b. Performance c. Services d. Processes.
Computer Science & Information Technology