Which of the following uses a symmetric key and a hashing algorithm?
A.
HMAC
B.
Triple-DES
C.
ISAKMP-OAKLEY
D.
RSA
Explanation:
A: When an HMAC function is used, a symmetric key is combined with the message, and then that result is put though a hashing algorithm. The result is an HMAC value. HMAC provides data origin authentication and data integrity.
When an HMAC function is used, a symmetric key is combined with the message, and then that result is put though a hashing algorithm. The result is an HMAC value. HMAC provides data origin authentication and data integrity
HMAC Hash-based message authentication code