Which statement about hashing algorithms is correct?
A.
They are used to provide data source origin authentication.
B.
The output they generate varies based on the size of the input data.
C.
They can be used instead of encryption algorithms for IPSec-based VPN networks.
D.
The output they generate is reversible provided that the same key is used at both end
devices.