Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?
A. symmetric algorithms
B. asymmetric algorithms
C. hashing algorithms
D. integrity algorithms
A. symmetric algorithms
B. asymmetric algorithms
C. hashing algorithms
D. integrity algorithms