Did we see symmetric key encryption used for authentication in this chapter? If so, how was it used? Describe the entries in the second row of Figure 3- 9. Comment on the strengths of the choices it uses.
a. For the second-to-last row of Figure 3-9, comment on the strengths of its symmetric encryption cipher and of its hashing algorithm.
b. Describe the entries in the last row of Figure 3-9. Comment on the strengths of the choices it uses.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here