You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a
hashing method in the organization that can resist forgery and is not open to the man-in-themiddle attack. Which of the following methods will you use to accomplish the task?
A.
MD
B.
NTLM
C.
MAC
D.
SHA