1.

Which figure implements confidentiality and authentication?I had been asked this question during an online interview.The above asked question is from Message Authentication Codes (MACs) topic in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer»

The CORRECT choice is (a) FIG 1

The explanation: Figure implements both CONFIDENTIALITY and authentication.



Discussion

No Comment Found

Related InterviewSolutions