Why would HMAC be used to help secure the data as it travels across various links?
- It is an asymmetric encryption algorithm used when the two communicating parties have not previously shared a secret key.
- It is a hashing algorithm used to guarantee that the message is not a forgery and actually comes from the authentic source.
- It is a hashing algorithm used to encrypt the message and guarantee that no one intercepted the message and altered it.
- It is a popular symmetric encryption algorithm used when each communicating party needs to know the pre-shared key.
Explanation: MD5 is a hashing algorithm that guarantees that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source.
Exam with this question: Module 15: Quiz – Cryptographic Services Network Security
Please login or Register to submit your answer