NETWORK SECURITY
DIGITAL SIGNATURE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
hash function
|
|
Message Encryption
|
|
Message Authentication Code
|
|
All of the above
|
Detailed explanation-1: -o Hash function: A function that maps a message of any length into a fixed-length hash value, o Message encryption: The ciphertext of the entire message serves as its authenticator. o Message authentication code (MAC): A function of the message and a secret key that produces. More items
Detailed explanation-2: -Any message authentication or digital signature mechanism has two levels of functionality. At the lower level, there must be some sort of function that produces an authenticator: a value to be used to authenticate a message. Any message authentication or digital signature mechanism has two levels of functionality.
Detailed explanation-3: -There are three basic types of authentication. The first is knowledge-based-something like a password or PIN code that only the identified user would know. The second is property-based, meaning the user possesses an access card, key, key fob or authorized device unique to them. The third is biologically based.