COMPUTER NETWORKING

NETWORK SECURITY

DIGITAL SIGNATURE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Release of message contents to any person or process not possessing the appropriate cryptographic key is called ____
A
Traffic Analysis
B
Disclosure
C
Masquerade
D
Non-repudiation
Explanation: 

Detailed explanation-1: -1. Disclosure: Release of message contents to any person or process not possessing the appropriate cryptographic key. 2. Traffic analysis: Discovery of the pattern of traffic between parties.

Detailed explanation-2: -MAC algorithm is a symmetric key cryptographic technique to provide message authentication. For establishing MAC process, the sender and receiver share a symmetric key K. Essentially, a MAC is an encrypted checksum generated on the underlying message that is sent along with a message to ensure message authentication.

Detailed explanation-3: -Message Authentication Code Processing. The process of verifying the integrity and authenticity of transmitted messages is called message authentication. Message authentication code (MAC) processing allows you to verify that a message was not altered or a message was not fraudulently introduced onto the system.

There is 1 question to complete.