To confirm integrity for a hashed message, the receiver should use:
A. a different hashing algorithm from the sender’s to create a numerical representation of the file.
B. a different hashing algorithm from the sender’s to create a binary image of the file.
C. the same hashing algorithm as the sender’s to create a binary image of the file.
D. the same hashing algorithm as the sender’s to create a numerical representation of the file.
A. a different hashing algorithm from the sender’s to create a numerical representation of the file.
B. a different hashing algorithm from the sender’s to create a binary image of the file.
C. the same hashing algorithm as the sender’s to create a binary image of the file.
D. the same hashing algorithm as the sender’s to create a numerical representation of the file.