The types of functions that may be used to produce an authenticator are grouped into three classes: hash function, message authentication code, and ___________ .

Fill in the blank(s) with the appropriate word(s).

message encryption

Computer Science & Information Technology

You might also like to view...

Using Filter by Form enables you to filter on multiple criteria

Indicate whether the statement is true or false

Computer Science & Information Technology

Account lockout is a mitigation strategy used by Jane, the administrator, to combat which of the following attacks?

A. Spoofing B. Man-in-the-middle C. Dictionary D. Brute force E. Privilege escalation

Computer Science & Information Technology