A message is being sent with a hash. The risk of an attacker changing the message and generating an authentic hash value can be mitigated by:
A. requiring the recipient to use a different hash algorithm.
B. generating hash output that is the same size as the original message.
C. using a secret key in conjunction with the hash algorithm.
D. using the sender’s public key to encrypt the message.
A. requiring the recipient to use a different hash algorithm.
B. generating hash output that is the same size as the original message.
C. using a secret key in conjunction with the hash algorithm.
D. using the sender’s public key to encrypt the message.