Which of the following algorithms should the software developer utilize?

A software developer utilizes cryptographic functions to generate codes that verify message
integrity. Due to the nature if the data that is being sent back and forth from the client application
to the server, the developer would like to change the cryptographic function to one that verities
both authentication and message integrity. Which of the following algorithms should the software
developer utilize?

A software developer utilizes cryptographic functions to generate codes that verify message
integrity. Due to the nature if the data that is being sent back and forth from the client application
to the server, the developer would like to change the cryptographic function to one that verities
both authentication and message integrity. Which of the following algorithms should the software
developer utilize?

A.
HMAC

B.
SHA

C.
Two Fish

D.
RIPEMD



Leave a Reply to Mike Cancel reply2

Your email address will not be published. Required fields are marked *

fifteen − four =


Mike

Mike

I think is “A”…. “Two popular hashing algorithms used to verify integrity are MD5 and SHA.
HMAC verifies both the integrity and authenticity of a message with the use
of a shared secret…” from Darril Gibson Study Guide

Paul

Paul

Agree with HMAC
In cryptography, a keyed-hash message authentication code (HMAC) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. It may be used to simultaneously verify both the data integrity and the authentication of a message, as with any MAC.