A software developer utilizes cryptographic functions to generate codes that verify message integrity. Due to the nature if the data that is being sent back and forth from the client application to the server, the developer would like to change the cryptographic function to one that verities both authentication and message integrity. Which of the following algorithms should the software developer utilize?

A. HMAC
B. SHA
C. Two Fish
D. RIPEMD

Answer: D. RIPEMD

Computer Science & Information Technology

You might also like to view...

A(n) ______ boot refers to the process of restarting a computer or mobile device while it remains powered on.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If cell A1 contained 10, cell A2 contained 2 and cell A3 contained =A1/A2, what would cell A3 show on the worksheet?

A. =A1/A2 B. =10/2 C. 5 D. =5

Computer Science & Information Technology