Part A Questions
Part A Questions
Since their development, one-way hash functions have been used more often in
encryption. People can use hashing to encrypt and decrypt digital signatures. The digital
signature is transformed into a hash value and sent to the receiver.
i. Unforgeable.
ii. Authentic.
iii. Can't be modified once sent.
iv. Not reusable.
v. Prevent repudiation.
Encryption and decryption, which allow two communicating parties to disguise data that
they send to each other. The sender encrypts, or scrambles, the data before sending it. The
receiver decrypts, or unscrambles, the data after receiving it.
6. Differentiate Message Authentication Code and Hash function. 2021(Mar)